Dec 13 14:22:07.854751 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:22:07.854777 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:22:07.854788 kernel: BIOS-provided physical RAM map: Dec 13 14:22:07.854796 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:22:07.854803 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:22:07.854811 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:22:07.854821 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Dec 13 14:22:07.854828 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Dec 13 14:22:07.854838 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:22:07.854857 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 14:22:07.854864 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 14:22:07.854872 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:22:07.854880 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Dec 13 14:22:07.854887 kernel: NX (Execute Disable) protection: active Dec 13 14:22:07.854899 kernel: SMBIOS 2.8 present. Dec 13 14:22:07.854908 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Dec 13 14:22:07.854916 kernel: Hypervisor detected: KVM Dec 13 14:22:07.854924 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:22:07.854931 kernel: kvm-clock: cpu 0, msr 2e19a001, primary cpu clock Dec 13 14:22:07.854938 kernel: kvm-clock: using sched offset of 2481032251 cycles Dec 13 14:22:07.854947 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:22:07.854954 kernel: tsc: Detected 2794.748 MHz processor Dec 13 14:22:07.854962 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:22:07.854972 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:22:07.854980 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Dec 13 14:22:07.854988 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:22:07.854995 kernel: Using GB pages for direct mapping Dec 13 14:22:07.855003 kernel: ACPI: Early table checksum verification disabled Dec 13 14:22:07.855011 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Dec 13 14:22:07.855019 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:07.855027 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:07.855035 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:07.855044 kernel: ACPI: FACS 0x000000009CFE0000 000040 Dec 13 14:22:07.855052 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:07.855060 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:07.855069 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:07.855077 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:07.855085 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] Dec 13 14:22:07.855093 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] Dec 13 14:22:07.855101 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Dec 13 14:22:07.855114 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] Dec 13 14:22:07.855122 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] Dec 13 14:22:07.855131 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] Dec 13 14:22:07.855140 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] Dec 13 14:22:07.855148 kernel: No NUMA configuration found Dec 13 14:22:07.855157 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Dec 13 14:22:07.855166 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Dec 13 14:22:07.855175 kernel: Zone ranges: Dec 13 14:22:07.855184 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:22:07.855192 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Dec 13 14:22:07.855210 kernel: Normal empty Dec 13 14:22:07.855219 kernel: Movable zone start for each node Dec 13 14:22:07.855227 kernel: Early memory node ranges Dec 13 14:22:07.855236 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:22:07.855244 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Dec 13 14:22:07.855254 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Dec 13 14:22:07.855263 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:22:07.855271 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:22:07.855280 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Dec 13 14:22:07.855288 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:22:07.855297 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:22:07.855306 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:22:07.855314 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:22:07.855323 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:22:07.855332 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:22:07.855342 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:22:07.855351 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:22:07.855360 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:22:07.855369 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:22:07.855377 kernel: TSC deadline timer available Dec 13 14:22:07.855386 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 14:22:07.855395 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 14:22:07.855404 kernel: kvm-guest: setup PV sched yield Dec 13 14:22:07.855413 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 14:22:07.855423 kernel: Booting paravirtualized kernel on KVM Dec 13 14:22:07.855433 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:22:07.855442 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 14:22:07.855451 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 14:22:07.855460 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 14:22:07.855469 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 14:22:07.855478 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 14:22:07.855486 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Dec 13 14:22:07.855495 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:22:07.855506 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:22:07.855515 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Dec 13 14:22:07.855524 kernel: Policy zone: DMA32 Dec 13 14:22:07.855534 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:22:07.855544 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:22:07.855553 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:22:07.855562 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:22:07.855571 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:22:07.855582 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 134796K reserved, 0K cma-reserved) Dec 13 14:22:07.855591 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 14:22:07.855600 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:22:07.855609 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:22:07.855618 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:22:07.855628 kernel: rcu: RCU event tracing is enabled. Dec 13 14:22:07.855637 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 14:22:07.855646 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:22:07.855655 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:22:07.855666 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:22:07.855675 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 14:22:07.855684 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 14:22:07.855693 kernel: random: crng init done Dec 13 14:22:07.855702 kernel: Console: colour VGA+ 80x25 Dec 13 14:22:07.855711 kernel: printk: console [ttyS0] enabled Dec 13 14:22:07.855720 kernel: ACPI: Core revision 20210730 Dec 13 14:22:07.855729 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 14:22:07.855738 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:22:07.855748 kernel: x2apic enabled Dec 13 14:22:07.855757 kernel: Switched APIC routing to physical x2apic. Dec 13 14:22:07.855766 kernel: kvm-guest: setup PV IPIs Dec 13 14:22:07.855776 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:22:07.855785 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:22:07.855794 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 14:22:07.855803 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 14:22:07.855812 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 14:22:07.855821 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 14:22:07.855837 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:22:07.855872 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:22:07.855881 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:22:07.855892 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:22:07.855902 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 14:22:07.855911 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 14:22:07.855920 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:22:07.855930 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:22:07.855940 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:22:07.855951 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:22:07.855960 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:22:07.855969 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:22:07.855979 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:22:07.855988 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:22:07.855998 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:22:07.856007 kernel: LSM: Security Framework initializing Dec 13 14:22:07.856017 kernel: SELinux: Initializing. Dec 13 14:22:07.856027 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:22:07.856036 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:22:07.856046 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 14:22:07.856055 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 14:22:07.856064 kernel: ... version: 0 Dec 13 14:22:07.856074 kernel: ... bit width: 48 Dec 13 14:22:07.856083 kernel: ... generic registers: 6 Dec 13 14:22:07.856092 kernel: ... value mask: 0000ffffffffffff Dec 13 14:22:07.856103 kernel: ... max period: 00007fffffffffff Dec 13 14:22:07.856112 kernel: ... fixed-purpose events: 0 Dec 13 14:22:07.856121 kernel: ... event mask: 000000000000003f Dec 13 14:22:07.856130 kernel: signal: max sigframe size: 1776 Dec 13 14:22:07.856140 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:22:07.856149 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:22:07.856158 kernel: x86: Booting SMP configuration: Dec 13 14:22:07.856168 kernel: .... node #0, CPUs: #1 Dec 13 14:22:07.856177 kernel: kvm-clock: cpu 1, msr 2e19a041, secondary cpu clock Dec 13 14:22:07.856187 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 14:22:07.856198 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Dec 13 14:22:07.856215 kernel: #2 Dec 13 14:22:07.856225 kernel: kvm-clock: cpu 2, msr 2e19a081, secondary cpu clock Dec 13 14:22:07.856234 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 14:22:07.856243 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Dec 13 14:22:07.856252 kernel: #3 Dec 13 14:22:07.856261 kernel: kvm-clock: cpu 3, msr 2e19a0c1, secondary cpu clock Dec 13 14:22:07.856270 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 14:22:07.856279 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Dec 13 14:22:07.856290 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 14:22:07.856299 kernel: smpboot: Max logical packages: 1 Dec 13 14:22:07.856309 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 14:22:07.856318 kernel: devtmpfs: initialized Dec 13 14:22:07.856327 kernel: x86/mm: Memory block size: 128MB Dec 13 14:22:07.856336 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:22:07.856346 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 14:22:07.856355 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:22:07.856364 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:22:07.856375 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:22:07.856384 kernel: audit: type=2000 audit(1734099727.071:1): state=initialized audit_enabled=0 res=1 Dec 13 14:22:07.856393 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:22:07.856406 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:22:07.856415 kernel: cpuidle: using governor menu Dec 13 14:22:07.856423 kernel: ACPI: bus type PCI registered Dec 13 14:22:07.856431 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:22:07.856439 kernel: dca service started, version 1.12.1 Dec 13 14:22:07.856453 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 14:22:07.856463 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 14:22:07.856472 kernel: PCI: Using configuration type 1 for base access Dec 13 14:22:07.856480 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:22:07.856489 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:22:07.856497 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:22:07.856505 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:22:07.856513 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:22:07.856521 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:22:07.856530 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:22:07.856539 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:22:07.856547 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:22:07.856555 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:22:07.856564 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:22:07.856572 kernel: ACPI: Interpreter enabled Dec 13 14:22:07.856580 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:22:07.856588 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:22:07.856596 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:22:07.856605 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 14:22:07.856613 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:22:07.856741 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:22:07.856822 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 14:22:07.856913 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 14:22:07.856925 kernel: PCI host bridge to bus 0000:00 Dec 13 14:22:07.857010 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:22:07.857080 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:22:07.857235 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:22:07.857322 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 14:22:07.857480 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:22:07.857614 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Dec 13 14:22:07.857703 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:22:07.857810 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 14:22:07.857933 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 14:22:07.858033 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Dec 13 14:22:07.858126 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Dec 13 14:22:07.858231 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Dec 13 14:22:07.858326 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:22:07.858428 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:22:07.858525 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 14:22:07.858625 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Dec 13 14:22:07.858719 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Dec 13 14:22:07.858823 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:22:07.858963 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 14:22:07.859059 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Dec 13 14:22:07.859151 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Dec 13 14:22:07.859264 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:22:07.859362 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Dec 13 14:22:07.859454 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Dec 13 14:22:07.859543 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Dec 13 14:22:07.859632 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Dec 13 14:22:07.865933 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 14:22:07.866061 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 14:22:07.866181 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 14:22:07.866309 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Dec 13 14:22:07.866434 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Dec 13 14:22:07.866564 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 14:22:07.866688 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 14:22:07.866705 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:22:07.866717 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:22:07.866739 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:22:07.866751 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:22:07.866761 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 14:22:07.866770 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 14:22:07.866790 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 14:22:07.866800 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 14:22:07.866809 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 14:22:07.866819 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 14:22:07.866828 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 14:22:07.866865 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 14:22:07.866877 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 14:22:07.866886 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 14:22:07.866895 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 14:22:07.866920 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 14:22:07.866933 kernel: iommu: Default domain type: Translated Dec 13 14:22:07.866942 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:22:07.867070 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 14:22:07.867332 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:22:07.867495 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 14:22:07.867514 kernel: vgaarb: loaded Dec 13 14:22:07.867524 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:22:07.867533 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:22:07.867543 kernel: PTP clock support registered Dec 13 14:22:07.867552 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:22:07.867562 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:22:07.867571 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:22:07.867580 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Dec 13 14:22:07.867591 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 14:22:07.867600 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 14:22:07.867609 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:22:07.867619 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:22:07.867629 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:22:07.867639 kernel: pnp: PnP ACPI init Dec 13 14:22:07.867741 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 14:22:07.867756 kernel: pnp: PnP ACPI: found 6 devices Dec 13 14:22:07.867766 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:22:07.867778 kernel: NET: Registered PF_INET protocol family Dec 13 14:22:07.867788 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:22:07.867797 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:22:07.867807 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:22:07.867817 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:22:07.867826 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:22:07.867836 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:22:07.867864 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:22:07.867877 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:22:07.867886 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:22:07.867895 kernel: NET: Registered PF_XDP protocol family Dec 13 14:22:07.867990 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:22:07.868074 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:22:07.868156 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:22:07.868250 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 14:22:07.868332 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 14:22:07.868414 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Dec 13 14:22:07.868430 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:22:07.868440 kernel: Initialise system trusted keyrings Dec 13 14:22:07.868449 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:22:07.868458 kernel: Key type asymmetric registered Dec 13 14:22:07.868467 kernel: Asymmetric key parser 'x509' registered Dec 13 14:22:07.868477 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:22:07.868486 kernel: io scheduler mq-deadline registered Dec 13 14:22:07.868496 kernel: io scheduler kyber registered Dec 13 14:22:07.868505 kernel: io scheduler bfq registered Dec 13 14:22:07.868517 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:22:07.868527 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 14:22:07.868536 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 14:22:07.868546 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 14:22:07.868555 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:22:07.868565 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:22:07.868574 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:22:07.868583 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:22:07.868593 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:22:07.868691 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:22:07.868706 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:22:07.868787 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:22:07.868907 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:22:07 UTC (1734099727) Dec 13 14:22:07.868993 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 14:22:07.869006 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:22:07.869015 kernel: Segment Routing with IPv6 Dec 13 14:22:07.869024 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:22:07.869037 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:22:07.869046 kernel: Key type dns_resolver registered Dec 13 14:22:07.869055 kernel: IPI shorthand broadcast: enabled Dec 13 14:22:07.869064 kernel: sched_clock: Marking stable (431615488, 115744629)->(611285368, -63925251) Dec 13 14:22:07.869074 kernel: registered taskstats version 1 Dec 13 14:22:07.869083 kernel: Loading compiled-in X.509 certificates Dec 13 14:22:07.869092 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:22:07.869102 kernel: Key type .fscrypt registered Dec 13 14:22:07.869111 kernel: Key type fscrypt-provisioning registered Dec 13 14:22:07.869122 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:22:07.869131 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:22:07.869140 kernel: ima: No architecture policies found Dec 13 14:22:07.869149 kernel: clk: Disabling unused clocks Dec 13 14:22:07.869159 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:22:07.869169 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:22:07.869178 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:22:07.869187 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:22:07.869198 kernel: Run /init as init process Dec 13 14:22:07.869217 kernel: with arguments: Dec 13 14:22:07.869226 kernel: /init Dec 13 14:22:07.869235 kernel: with environment: Dec 13 14:22:07.869244 kernel: HOME=/ Dec 13 14:22:07.869253 kernel: TERM=linux Dec 13 14:22:07.869262 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:22:07.869275 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:22:07.869287 systemd[1]: Detected virtualization kvm. Dec 13 14:22:07.869300 systemd[1]: Detected architecture x86-64. Dec 13 14:22:07.869310 systemd[1]: Running in initrd. Dec 13 14:22:07.869320 systemd[1]: No hostname configured, using default hostname. Dec 13 14:22:07.869330 systemd[1]: Hostname set to . Dec 13 14:22:07.869340 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:22:07.869350 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:22:07.869360 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:22:07.869370 systemd[1]: Reached target cryptsetup.target. Dec 13 14:22:07.869381 systemd[1]: Reached target paths.target. Dec 13 14:22:07.869400 systemd[1]: Reached target slices.target. Dec 13 14:22:07.869411 systemd[1]: Reached target swap.target. Dec 13 14:22:07.869422 systemd[1]: Reached target timers.target. Dec 13 14:22:07.869432 systemd[1]: Listening on iscsid.socket. Dec 13 14:22:07.869444 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:22:07.869454 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:22:07.869464 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:22:07.869475 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:22:07.869485 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:22:07.869495 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:22:07.869505 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:22:07.869515 systemd[1]: Reached target sockets.target. Dec 13 14:22:07.869525 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:22:07.869537 systemd[1]: Finished network-cleanup.service. Dec 13 14:22:07.869548 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:22:07.869558 systemd[1]: Starting systemd-journald.service... Dec 13 14:22:07.869568 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:22:07.869578 systemd[1]: Starting systemd-resolved.service... Dec 13 14:22:07.869588 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:22:07.869598 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:22:07.869608 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:22:07.869619 kernel: audit: type=1130 audit(1734099727.853:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.869631 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:22:07.869645 systemd-journald[197]: Journal started Dec 13 14:22:07.869697 systemd-journald[197]: Runtime Journal (/run/log/journal/e4078d01ec044caab60b86a57aa0ed1f) is 6.0M, max 48.5M, 42.5M free. Dec 13 14:22:07.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.857540 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 14:22:07.900662 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:22:07.900684 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:22:07.877241 systemd-resolved[199]: Positive Trust Anchors: Dec 13 14:22:07.902223 kernel: Bridge firewalling registered Dec 13 14:22:07.877255 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:22:07.877293 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:22:07.913819 kernel: audit: type=1130 audit(1734099727.904:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.913835 systemd[1]: Started systemd-journald.service. Dec 13 14:22:07.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.880184 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 14:22:07.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.902211 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 14:22:07.923077 kernel: audit: type=1130 audit(1734099727.914:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.923096 kernel: audit: type=1130 audit(1734099727.918:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.914810 systemd[1]: Started systemd-resolved.service. Dec 13 14:22:07.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.919556 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:22:07.924150 systemd[1]: Reached target nss-lookup.target. Dec 13 14:22:07.930584 kernel: audit: type=1130 audit(1734099727.923:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.930407 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:22:07.941622 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:22:07.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.943343 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:22:07.948317 kernel: audit: type=1130 audit(1734099727.941:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.949862 kernel: SCSI subsystem initialized Dec 13 14:22:07.953653 dracut-cmdline[216]: dracut-dracut-053 Dec 13 14:22:07.955987 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:22:07.963864 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:22:07.963901 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:22:07.965857 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:22:07.968883 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 14:22:07.969596 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:22:07.975065 kernel: audit: type=1130 audit(1734099727.970:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.971777 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:22:07.980949 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:22:07.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.985863 kernel: audit: type=1130 audit(1734099727.980:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.025878 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:22:08.046867 kernel: iscsi: registered transport (tcp) Dec 13 14:22:08.068354 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:22:08.068386 kernel: QLogic iSCSI HBA Driver Dec 13 14:22:08.094664 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:22:08.100107 kernel: audit: type=1130 audit(1734099728.094:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.096233 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:22:08.140869 kernel: raid6: avx2x4 gen() 30487 MB/s Dec 13 14:22:08.157874 kernel: raid6: avx2x4 xor() 7767 MB/s Dec 13 14:22:08.174876 kernel: raid6: avx2x2 gen() 29301 MB/s Dec 13 14:22:08.191894 kernel: raid6: avx2x2 xor() 16059 MB/s Dec 13 14:22:08.208878 kernel: raid6: avx2x1 gen() 18673 MB/s Dec 13 14:22:08.225871 kernel: raid6: avx2x1 xor() 11854 MB/s Dec 13 14:22:08.242871 kernel: raid6: sse2x4 gen() 12317 MB/s Dec 13 14:22:08.259870 kernel: raid6: sse2x4 xor() 6215 MB/s Dec 13 14:22:08.276868 kernel: raid6: sse2x2 gen() 12013 MB/s Dec 13 14:22:08.293929 kernel: raid6: sse2x2 xor() 7350 MB/s Dec 13 14:22:08.310877 kernel: raid6: sse2x1 gen() 10041 MB/s Dec 13 14:22:08.328402 kernel: raid6: sse2x1 xor() 7314 MB/s Dec 13 14:22:08.328435 kernel: raid6: using algorithm avx2x4 gen() 30487 MB/s Dec 13 14:22:08.328446 kernel: raid6: .... xor() 7767 MB/s, rmw enabled Dec 13 14:22:08.329150 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:22:08.343885 kernel: xor: automatically using best checksumming function avx Dec 13 14:22:08.442908 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:22:08.452135 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:22:08.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.465000 audit: BPF prog-id=7 op=LOAD Dec 13 14:22:08.466000 audit: BPF prog-id=8 op=LOAD Dec 13 14:22:08.467433 systemd[1]: Starting systemd-udevd.service... Dec 13 14:22:08.483273 systemd-udevd[400]: Using default interface naming scheme 'v252'. Dec 13 14:22:08.488462 systemd[1]: Started systemd-udevd.service. Dec 13 14:22:08.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.489397 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:22:08.501505 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Dec 13 14:22:08.527526 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:22:08.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.529933 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:22:08.571139 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:22:08.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.597975 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 14:22:08.604596 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:22:08.604614 kernel: GPT:9289727 != 19775487 Dec 13 14:22:08.604626 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:22:08.604639 kernel: GPT:9289727 != 19775487 Dec 13 14:22:08.604650 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:22:08.604661 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:22:08.608869 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:22:08.615862 kernel: libata version 3.00 loaded. Dec 13 14:22:08.623464 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:22:08.623486 kernel: AES CTR mode by8 optimization enabled Dec 13 14:22:08.637869 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (456) Dec 13 14:22:08.640823 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:22:08.643005 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 14:22:08.659426 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 14:22:08.659443 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 14:22:08.659532 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 14:22:08.659605 kernel: scsi host0: ahci Dec 13 14:22:08.659690 kernel: scsi host1: ahci Dec 13 14:22:08.659781 kernel: scsi host2: ahci Dec 13 14:22:08.659880 kernel: scsi host3: ahci Dec 13 14:22:08.659969 kernel: scsi host4: ahci Dec 13 14:22:08.660047 kernel: scsi host5: ahci Dec 13 14:22:08.660129 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Dec 13 14:22:08.660139 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Dec 13 14:22:08.660147 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Dec 13 14:22:08.660156 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Dec 13 14:22:08.660165 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Dec 13 14:22:08.660176 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Dec 13 14:22:08.645220 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:22:08.654686 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:22:08.704983 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:22:08.710607 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:22:08.711559 systemd[1]: Starting disk-uuid.service... Dec 13 14:22:08.925748 disk-uuid[544]: Primary Header is updated. Dec 13 14:22:08.925748 disk-uuid[544]: Secondary Entries is updated. Dec 13 14:22:08.925748 disk-uuid[544]: Secondary Header is updated. Dec 13 14:22:08.958866 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:22:08.961870 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:22:08.965862 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:22:08.971094 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:08.971119 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:08.971854 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 14:22:08.998961 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 14:22:09.002524 kernel: ata3.00: applying bridge limits Dec 13 14:22:09.002549 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:09.002859 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:09.005863 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:09.005890 kernel: ata3.00: configured for UDMA/100 Dec 13 14:22:09.006858 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 14:22:09.048335 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 14:22:09.066452 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:22:09.066471 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:22:09.962384 disk-uuid[545]: The operation has completed successfully. Dec 13 14:22:09.963760 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:22:09.987429 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:22:09.987530 systemd[1]: Finished disk-uuid.service. Dec 13 14:22:09.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:09.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:09.993920 systemd[1]: Starting verity-setup.service... Dec 13 14:22:10.006859 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 14:22:10.027670 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:22:10.030069 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:22:10.032069 systemd[1]: Finished verity-setup.service. Dec 13 14:22:10.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.093732 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:22:10.095136 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:22:10.093925 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:22:10.095171 systemd[1]: Starting ignition-setup.service... Dec 13 14:22:10.097594 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:22:10.107988 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:22:10.108021 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:22:10.108032 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:22:10.116167 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:22:10.161627 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:22:10.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.162000 audit: BPF prog-id=9 op=LOAD Dec 13 14:22:10.163803 systemd[1]: Starting systemd-networkd.service... Dec 13 14:22:10.184498 systemd-networkd[719]: lo: Link UP Dec 13 14:22:10.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.184510 systemd-networkd[719]: lo: Gained carrier Dec 13 14:22:10.184918 systemd-networkd[719]: Enumeration completed Dec 13 14:22:10.184997 systemd[1]: Started systemd-networkd.service. Dec 13 14:22:10.185106 systemd-networkd[719]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:22:10.193671 systemd[1]: Reached target network.target. Dec 13 14:22:10.193773 systemd-networkd[719]: eth0: Link UP Dec 13 14:22:10.193778 systemd-networkd[719]: eth0: Gained carrier Dec 13 14:22:10.200814 systemd[1]: Starting iscsiuio.service... Dec 13 14:22:10.205205 systemd[1]: Started iscsiuio.service. Dec 13 14:22:10.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.207834 systemd[1]: Starting iscsid.service... Dec 13 14:22:10.210954 systemd-networkd[719]: eth0: DHCPv4 address 10.0.0.66/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:22:10.212613 iscsid[724]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:22:10.212613 iscsid[724]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:22:10.212613 iscsid[724]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:22:10.212613 iscsid[724]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:22:10.212613 iscsid[724]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:22:10.212613 iscsid[724]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:22:10.220577 systemd[1]: Started iscsid.service. Dec 13 14:22:10.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.227529 systemd[1]: Finished ignition-setup.service. Dec 13 14:22:10.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.230345 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:22:10.232822 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:22:10.241231 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:22:10.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.243498 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:22:10.245620 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:22:10.247732 systemd[1]: Reached target remote-fs.target. Dec 13 14:22:10.250785 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:22:10.259714 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:22:10.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.272804 ignition[727]: Ignition 2.14.0 Dec 13 14:22:10.272814 ignition[727]: Stage: fetch-offline Dec 13 14:22:10.272870 ignition[727]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:10.272879 ignition[727]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:10.272974 ignition[727]: parsed url from cmdline: "" Dec 13 14:22:10.272977 ignition[727]: no config URL provided Dec 13 14:22:10.272982 ignition[727]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:22:10.272989 ignition[727]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:22:10.273007 ignition[727]: op(1): [started] loading QEMU firmware config module Dec 13 14:22:10.273011 ignition[727]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 14:22:10.276110 ignition[727]: op(1): [finished] loading QEMU firmware config module Dec 13 14:22:10.320664 ignition[727]: parsing config with SHA512: 34ce928d15ab2b0f4f2e5aee021d559d7c985f802fe7f5ea08f1deac95fe0d0bef945c0fbec29775b1845d7b91d98b9b18ca47462b1a4a98c29f429edc743871 Dec 13 14:22:10.327059 unknown[727]: fetched base config from "system" Dec 13 14:22:10.327642 ignition[727]: fetch-offline: fetch-offline passed Dec 13 14:22:10.327078 unknown[727]: fetched user config from "qemu" Dec 13 14:22:10.327715 ignition[727]: Ignition finished successfully Dec 13 14:22:10.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.327744 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.66 Dec 13 14:22:10.327754 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux3'. Dec 13 14:22:10.331084 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:22:10.333020 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:22:10.333944 systemd[1]: Starting ignition-kargs.service... Dec 13 14:22:10.344980 ignition[747]: Ignition 2.14.0 Dec 13 14:22:10.344992 ignition[747]: Stage: kargs Dec 13 14:22:10.345107 ignition[747]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:10.345119 ignition[747]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:10.347720 systemd[1]: Finished ignition-kargs.service. Dec 13 14:22:10.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.346246 ignition[747]: kargs: kargs passed Dec 13 14:22:10.350534 systemd[1]: Starting ignition-disks.service... Dec 13 14:22:10.346294 ignition[747]: Ignition finished successfully Dec 13 14:22:10.360679 ignition[753]: Ignition 2.14.0 Dec 13 14:22:10.360693 ignition[753]: Stage: disks Dec 13 14:22:10.360808 ignition[753]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:10.360820 ignition[753]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:10.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.363006 systemd[1]: Finished ignition-disks.service. Dec 13 14:22:10.362090 ignition[753]: disks: disks passed Dec 13 14:22:10.364351 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:22:10.362138 ignition[753]: Ignition finished successfully Dec 13 14:22:10.366420 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:22:10.367373 systemd[1]: Reached target local-fs.target. Dec 13 14:22:10.368278 systemd[1]: Reached target sysinit.target. Dec 13 14:22:10.369992 systemd[1]: Reached target basic.target. Dec 13 14:22:10.371794 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:22:10.382763 systemd-fsck[761]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:22:10.387597 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:22:10.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.388495 systemd[1]: Mounting sysroot.mount... Dec 13 14:22:10.394597 systemd[1]: Mounted sysroot.mount. Dec 13 14:22:10.395877 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:22:10.394707 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:22:10.397749 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:22:10.399532 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:22:10.399577 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:22:10.399599 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:22:10.406415 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:22:10.408044 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:22:10.413777 initrd-setup-root[771]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:22:10.417299 initrd-setup-root[779]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:22:10.420279 initrd-setup-root[787]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:22:10.424254 initrd-setup-root[795]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:22:10.451225 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:22:10.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.453038 systemd[1]: Starting ignition-mount.service... Dec 13 14:22:10.453730 systemd[1]: Starting sysroot-boot.service... Dec 13 14:22:10.461562 bash[813]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:22:10.470766 ignition[814]: INFO : Ignition 2.14.0 Dec 13 14:22:10.470766 ignition[814]: INFO : Stage: mount Dec 13 14:22:10.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:10.474331 ignition[814]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:10.474331 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:10.474331 ignition[814]: INFO : mount: mount passed Dec 13 14:22:10.474331 ignition[814]: INFO : Ignition finished successfully Dec 13 14:22:10.470889 systemd[1]: Finished sysroot-boot.service. Dec 13 14:22:10.472931 systemd[1]: Finished ignition-mount.service. Dec 13 14:22:11.042402 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:22:11.050520 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (822) Dec 13 14:22:11.050553 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:22:11.050566 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:22:11.051373 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:22:11.055762 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:22:11.057686 systemd[1]: Starting ignition-files.service... Dec 13 14:22:11.074431 ignition[842]: INFO : Ignition 2.14.0 Dec 13 14:22:11.074431 ignition[842]: INFO : Stage: files Dec 13 14:22:11.076544 ignition[842]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:11.076544 ignition[842]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:11.076544 ignition[842]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:22:11.080892 ignition[842]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:22:11.080892 ignition[842]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:22:11.085221 ignition[842]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:22:11.086809 ignition[842]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:22:11.088755 unknown[842]: wrote ssh authorized keys file for user: core Dec 13 14:22:11.089916 ignition[842]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:22:11.091325 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:22:11.091325 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:22:11.143676 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:22:11.264590 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:22:11.267279 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:22:11.690136 systemd-networkd[719]: eth0: Gained IPv6LL Dec 13 14:22:11.736431 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 14:22:12.461725 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:22:12.461725 ignition[842]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:22:12.466883 ignition[842]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:22:12.549379 ignition[842]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:22:12.549379 ignition[842]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:22:12.552879 ignition[842]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:22:12.552879 ignition[842]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:22:12.552879 ignition[842]: INFO : files: files passed Dec 13 14:22:12.552879 ignition[842]: INFO : Ignition finished successfully Dec 13 14:22:12.558925 systemd[1]: Finished ignition-files.service. Dec 13 14:22:12.565759 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:22:12.565793 kernel: audit: type=1130 audit(1734099732.558:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.560591 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:22:12.565711 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:22:12.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.571123 initrd-setup-root-after-ignition[866]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 14:22:12.576855 kernel: audit: type=1130 audit(1734099732.570:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.566252 systemd[1]: Starting ignition-quench.service... Dec 13 14:22:12.585532 kernel: audit: type=1130 audit(1734099732.576:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.585555 kernel: audit: type=1131 audit(1734099732.576:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.585737 initrd-setup-root-after-ignition[868]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:22:12.568164 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:22:12.571188 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:22:12.571249 systemd[1]: Finished ignition-quench.service. Dec 13 14:22:12.576965 systemd[1]: Reached target ignition-complete.target. Dec 13 14:22:12.586030 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:22:12.596818 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:22:12.596928 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:22:12.607177 kernel: audit: type=1130 audit(1734099732.598:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.607197 kernel: audit: type=1131 audit(1734099732.598:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.599317 systemd[1]: Reached target initrd-fs.target. Dec 13 14:22:12.607178 systemd[1]: Reached target initrd.target. Dec 13 14:22:12.608124 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:22:12.608673 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:22:12.617078 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:22:12.622584 kernel: audit: type=1130 audit(1734099732.617:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.618493 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:22:12.627472 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:22:12.628414 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:22:12.630123 systemd[1]: Stopped target timers.target. Dec 13 14:22:12.631714 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:22:12.637067 kernel: audit: type=1131 audit(1734099732.632:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.631859 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:22:12.633392 systemd[1]: Stopped target initrd.target. Dec 13 14:22:12.637961 systemd[1]: Stopped target basic.target. Dec 13 14:22:12.639507 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:22:12.641148 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:22:12.642720 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:22:12.644607 systemd[1]: Stopped target remote-fs.target. Dec 13 14:22:12.646398 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:22:12.648186 systemd[1]: Stopped target sysinit.target. Dec 13 14:22:12.649731 systemd[1]: Stopped target local-fs.target. Dec 13 14:22:12.651377 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:22:12.653021 systemd[1]: Stopped target swap.target. Dec 13 14:22:12.660976 kernel: audit: type=1131 audit(1734099732.655:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.654664 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:22:12.654801 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:22:12.667997 kernel: audit: type=1131 audit(1734099732.662:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.656613 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:22:12.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.661023 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:22:12.661121 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:22:12.663083 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:22:12.663176 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:22:12.668128 systemd[1]: Stopped target paths.target. Dec 13 14:22:12.669769 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:22:12.673894 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:22:12.675715 systemd[1]: Stopped target slices.target. Dec 13 14:22:12.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.677060 systemd[1]: Stopped target sockets.target. Dec 13 14:22:12.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.678998 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:22:12.686090 iscsid[724]: iscsid shutting down. Dec 13 14:22:12.679091 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:22:12.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.681300 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:22:12.681384 systemd[1]: Stopped ignition-files.service. Dec 13 14:22:12.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.694450 ignition[883]: INFO : Ignition 2.14.0 Dec 13 14:22:12.694450 ignition[883]: INFO : Stage: umount Dec 13 14:22:12.694450 ignition[883]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:12.694450 ignition[883]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:12.694450 ignition[883]: INFO : umount: umount passed Dec 13 14:22:12.694450 ignition[883]: INFO : Ignition finished successfully Dec 13 14:22:12.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.683721 systemd[1]: Stopping ignition-mount.service... Dec 13 14:22:12.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.686165 systemd[1]: Stopping iscsid.service... Dec 13 14:22:12.686991 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:22:12.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.687181 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:22:12.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.689952 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:22:12.690680 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:22:12.690829 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:22:12.692707 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:22:12.692861 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:22:12.696341 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:22:12.696434 systemd[1]: Stopped iscsid.service. Dec 13 14:22:12.698494 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:22:12.698565 systemd[1]: Stopped ignition-mount.service. Dec 13 14:22:12.700785 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:22:12.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.700886 systemd[1]: Closed iscsid.socket. Dec 13 14:22:12.702138 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:22:12.702176 systemd[1]: Stopped ignition-disks.service. Dec 13 14:22:12.704797 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:22:12.704835 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:22:12.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.705873 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:22:12.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.705903 systemd[1]: Stopped ignition-setup.service. Dec 13 14:22:12.707055 systemd[1]: Stopping iscsiuio.service... Dec 13 14:22:12.710292 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:22:12.710869 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:22:12.710970 systemd[1]: Stopped iscsiuio.service. Dec 13 14:22:12.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.712344 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:22:12.712428 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:22:12.751000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:22:12.715050 systemd[1]: Stopped target network.target. Dec 13 14:22:12.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.716183 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:22:12.716212 systemd[1]: Closed iscsiuio.socket. Dec 13 14:22:12.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.718154 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:22:12.719789 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:22:12.723927 systemd-networkd[719]: eth0: DHCPv6 lease lost Dec 13 14:22:12.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.762000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:22:12.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.725523 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:22:12.725664 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:22:12.729792 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:22:12.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.729831 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:22:12.734347 systemd[1]: Stopping network-cleanup.service... Dec 13 14:22:12.736168 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:22:12.736219 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:22:12.738253 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:22:12.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.738310 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:22:12.739721 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:22:12.739763 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:22:12.741925 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:22:12.746509 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:22:12.747021 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:22:12.747123 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:22:12.752218 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:22:12.752329 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:22:12.754474 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:22:12.754541 systemd[1]: Stopped network-cleanup.service. Dec 13 14:22:12.756474 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:22:12.756513 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:22:12.758292 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:22:12.758327 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:22:12.760224 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:22:12.760260 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:22:12.762146 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:22:12.762176 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:22:12.763142 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:22:12.763172 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:22:12.765769 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:22:12.767023 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:22:12.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.767075 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:22:12.773167 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:22:12.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.773239 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:22:12.796262 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:22:12.796354 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:22:12.798078 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:22:12.799933 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:22:12.799971 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:22:12.802280 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:22:12.818700 systemd[1]: Switching root. Dec 13 14:22:12.836651 systemd-journald[197]: Journal stopped Dec 13 14:22:15.428650 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Dec 13 14:22:15.428689 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:22:15.428703 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:22:15.428712 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:22:15.428722 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:22:15.428733 kernel: SELinux: policy capability open_perms=1 Dec 13 14:22:15.428742 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:22:15.428751 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:22:15.428760 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:22:15.428769 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:22:15.428779 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:22:15.428788 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:22:15.428798 systemd[1]: Successfully loaded SELinux policy in 40.749ms. Dec 13 14:22:15.428814 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.569ms. Dec 13 14:22:15.428828 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:22:15.428840 systemd[1]: Detected virtualization kvm. Dec 13 14:22:15.428872 systemd[1]: Detected architecture x86-64. Dec 13 14:22:15.428885 systemd[1]: Detected first boot. Dec 13 14:22:15.428899 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:22:15.428917 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:22:15.428929 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:22:15.428940 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:22:15.428953 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:22:15.428966 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:22:15.428976 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:22:15.428986 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:22:15.429000 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:22:15.429010 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:22:15.429019 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:22:15.429029 systemd[1]: Created slice system-getty.slice. Dec 13 14:22:15.429049 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:22:15.429060 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:22:15.429074 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:22:15.429087 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:22:15.429098 systemd[1]: Created slice user.slice. Dec 13 14:22:15.429109 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:22:15.429121 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:22:15.429131 systemd[1]: Set up automount boot.automount. Dec 13 14:22:15.429141 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:22:15.429154 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:22:15.429163 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:22:15.429173 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:22:15.429183 systemd[1]: Reached target integritysetup.target. Dec 13 14:22:15.429194 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:22:15.429204 systemd[1]: Reached target remote-fs.target. Dec 13 14:22:15.429214 systemd[1]: Reached target slices.target. Dec 13 14:22:15.429224 systemd[1]: Reached target swap.target. Dec 13 14:22:15.429233 systemd[1]: Reached target torcx.target. Dec 13 14:22:15.429243 systemd[1]: Reached target veritysetup.target. Dec 13 14:22:15.429253 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:22:15.429263 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:22:15.429273 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:22:15.429284 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:22:15.429293 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:22:15.429303 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:22:15.429313 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:22:15.429323 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:22:15.429333 systemd[1]: Mounting media.mount... Dec 13 14:22:15.429343 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:15.429353 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:22:15.429363 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:22:15.429374 systemd[1]: Mounting tmp.mount... Dec 13 14:22:15.429384 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:22:15.429393 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:15.429403 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:22:15.429413 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:22:15.429423 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:15.429433 systemd[1]: Starting modprobe@drm.service... Dec 13 14:22:15.429443 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:15.429452 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:22:15.429462 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:15.429474 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:22:15.429484 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:22:15.429494 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:22:15.429503 kernel: loop: module loaded Dec 13 14:22:15.429513 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:22:15.429522 kernel: fuse: init (API version 7.34) Dec 13 14:22:15.429532 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:22:15.429543 systemd[1]: Stopped systemd-journald.service. Dec 13 14:22:15.429554 systemd[1]: Starting systemd-journald.service... Dec 13 14:22:15.429564 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:22:15.429574 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:22:15.429585 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:22:15.429594 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:22:15.429604 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:22:15.429614 systemd[1]: Stopped verity-setup.service. Dec 13 14:22:15.429626 systemd-journald[1004]: Journal started Dec 13 14:22:15.429669 systemd-journald[1004]: Runtime Journal (/run/log/journal/e4078d01ec044caab60b86a57aa0ed1f) is 6.0M, max 48.5M, 42.5M free. Dec 13 14:22:12.897000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:22:13.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:22:13.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:22:13.076000 audit: BPF prog-id=10 op=LOAD Dec 13 14:22:13.076000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:22:13.076000 audit: BPF prog-id=11 op=LOAD Dec 13 14:22:13.076000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:22:13.108000 audit[915]: AVC avc: denied { associate } for pid=915 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:22:13.108000 audit[915]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=898 pid=915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:13.108000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:22:13.109000 audit[915]: AVC avc: denied { associate } for pid=915 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:22:13.109000 audit[915]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=898 pid=915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:13.109000 audit: CWD cwd="/" Dec 13 14:22:13.109000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:13.109000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:13.109000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:22:15.295000 audit: BPF prog-id=12 op=LOAD Dec 13 14:22:15.295000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:22:15.295000 audit: BPF prog-id=13 op=LOAD Dec 13 14:22:15.296000 audit: BPF prog-id=14 op=LOAD Dec 13 14:22:15.296000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:22:15.296000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:22:15.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.306000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:22:15.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.411000 audit: BPF prog-id=15 op=LOAD Dec 13 14:22:15.411000 audit: BPF prog-id=16 op=LOAD Dec 13 14:22:15.411000 audit: BPF prog-id=17 op=LOAD Dec 13 14:22:15.411000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:22:15.411000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:22:15.424000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:22:15.424000 audit[1004]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffecc78e00 a2=4000 a3=7fffecc78e9c items=0 ppid=1 pid=1004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:15.424000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:22:13.107926 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:22:15.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.294745 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:22:13.108121 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:22:15.294756 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:22:13.108136 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:22:15.297560 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:22:13.108162 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:22:13.108171 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:22:13.108196 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:22:13.108206 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:22:13.108380 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:22:13.108412 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:22:13.108424 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:22:13.108702 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:22:13.108734 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:22:13.108750 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:22:13.108763 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:22:13.108776 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:22:13.108788 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:22:15.013526 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:15Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:15.013804 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:15Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:15.013940 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:15Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:15.014130 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:15Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:15.014180 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:15Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:22:15.014236 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:15Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:22:15.432870 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:15.435398 systemd[1]: Started systemd-journald.service. Dec 13 14:22:15.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.435926 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:22:15.436798 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:22:15.437658 systemd[1]: Mounted media.mount. Dec 13 14:22:15.438475 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:22:15.439390 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:22:15.440335 systemd[1]: Mounted tmp.mount. Dec 13 14:22:15.441271 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:22:15.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.442408 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:22:15.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.443493 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:22:15.443610 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:22:15.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.444694 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:15.444811 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:15.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.445920 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:22:15.446027 systemd[1]: Finished modprobe@drm.service. Dec 13 14:22:15.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.447066 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:15.447183 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:15.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.448295 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:22:15.448411 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:22:15.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.449561 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:15.449699 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:15.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.450787 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:22:15.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.451956 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:22:15.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.453270 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:22:15.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.454522 systemd[1]: Reached target network-pre.target. Dec 13 14:22:15.456342 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:22:15.458393 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:22:15.459298 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:22:15.460484 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:22:15.462297 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:22:15.463568 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:15.464556 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:22:15.465826 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:15.466722 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:22:15.467731 systemd-journald[1004]: Time spent on flushing to /var/log/journal/e4078d01ec044caab60b86a57aa0ed1f is 18.602ms for 1094 entries. Dec 13 14:22:15.467731 systemd-journald[1004]: System Journal (/var/log/journal/e4078d01ec044caab60b86a57aa0ed1f) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:22:15.500156 systemd-journald[1004]: Received client request to flush runtime journal. Dec 13 14:22:15.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.470487 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:22:15.474350 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:22:15.475825 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:22:15.500692 udevadm[1019]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:22:15.477470 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:22:15.479244 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:22:15.481100 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:22:15.483425 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:22:15.484767 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:22:15.486265 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:22:15.500915 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:22:15.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.873180 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:22:15.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.874000 audit: BPF prog-id=18 op=LOAD Dec 13 14:22:15.874000 audit: BPF prog-id=19 op=LOAD Dec 13 14:22:15.874000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:22:15.874000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:22:15.875485 systemd[1]: Starting systemd-udevd.service... Dec 13 14:22:15.890238 systemd-udevd[1021]: Using default interface naming scheme 'v252'. Dec 13 14:22:15.901729 systemd[1]: Started systemd-udevd.service. Dec 13 14:22:15.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.902000 audit: BPF prog-id=20 op=LOAD Dec 13 14:22:15.903945 systemd[1]: Starting systemd-networkd.service... Dec 13 14:22:15.910000 audit: BPF prog-id=21 op=LOAD Dec 13 14:22:15.910000 audit: BPF prog-id=22 op=LOAD Dec 13 14:22:15.910000 audit: BPF prog-id=23 op=LOAD Dec 13 14:22:15.911892 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:22:15.938963 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:22:15.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.945486 systemd[1]: Started systemd-userdbd.service. Dec 13 14:22:15.966888 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:22:15.970867 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:22:15.972351 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:22:15.988000 audit[1031]: AVC avc: denied { confidentiality } for pid=1031 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:22:15.988000 audit[1031]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55dfc5eccd30 a1=337fc a2=7f02cd47ebc5 a3=5 items=110 ppid=1021 pid=1031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:15.988000 audit: CWD cwd="/" Dec 13 14:22:15.988000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=1 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=2 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=3 name=(null) inode=15006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=4 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=5 name=(null) inode=15007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=6 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=7 name=(null) inode=15008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=8 name=(null) inode=15008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=9 name=(null) inode=15009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=10 name=(null) inode=15008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=11 name=(null) inode=15010 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=12 name=(null) inode=15008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=13 name=(null) inode=15011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=14 name=(null) inode=15008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=15 name=(null) inode=15012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=16 name=(null) inode=15008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=17 name=(null) inode=15013 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=18 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=19 name=(null) inode=15014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=20 name=(null) inode=15014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=21 name=(null) inode=15015 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=22 name=(null) inode=15014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=23 name=(null) inode=15016 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=24 name=(null) inode=15014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=25 name=(null) inode=15017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=26 name=(null) inode=15014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=27 name=(null) inode=15018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=28 name=(null) inode=15014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=29 name=(null) inode=15019 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=30 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=31 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=32 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=33 name=(null) inode=15021 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=34 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=35 name=(null) inode=15022 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=36 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=37 name=(null) inode=15023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=38 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=39 name=(null) inode=15024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=40 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=41 name=(null) inode=15025 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=42 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=43 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=44 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=45 name=(null) inode=15027 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=46 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=47 name=(null) inode=15028 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=48 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=49 name=(null) inode=15029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=50 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=51 name=(null) inode=15030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=52 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=53 name=(null) inode=15031 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=55 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=56 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=57 name=(null) inode=15033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=58 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=59 name=(null) inode=15034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=60 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=61 name=(null) inode=15035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=62 name=(null) inode=15035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=63 name=(null) inode=15036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=64 name=(null) inode=15035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=65 name=(null) inode=15037 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=66 name=(null) inode=15035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=67 name=(null) inode=15038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=68 name=(null) inode=15035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=69 name=(null) inode=15039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=70 name=(null) inode=15035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=71 name=(null) inode=15040 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=72 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=73 name=(null) inode=15041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=74 name=(null) inode=15041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=75 name=(null) inode=15042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=76 name=(null) inode=15041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=77 name=(null) inode=15043 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=78 name=(null) inode=15041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=79 name=(null) inode=15044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=80 name=(null) inode=15041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=81 name=(null) inode=15045 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=82 name=(null) inode=15041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=83 name=(null) inode=15046 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=84 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=85 name=(null) inode=15047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=86 name=(null) inode=15047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=87 name=(null) inode=15048 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=88 name=(null) inode=15047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=89 name=(null) inode=15049 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=90 name=(null) inode=15047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=91 name=(null) inode=15050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=92 name=(null) inode=15047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=93 name=(null) inode=15051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=94 name=(null) inode=15047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=95 name=(null) inode=15052 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=96 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=97 name=(null) inode=15053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=98 name=(null) inode=15053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=99 name=(null) inode=15054 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=100 name=(null) inode=15053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=101 name=(null) inode=15055 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=102 name=(null) inode=15053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=103 name=(null) inode=15056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=104 name=(null) inode=15053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=105 name=(null) inode=15057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=106 name=(null) inode=15053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=107 name=(null) inode=15058 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PATH item=109 name=(null) inode=15059 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:15.988000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:22:15.997694 systemd-networkd[1026]: lo: Link UP Dec 13 14:22:15.997701 systemd-networkd[1026]: lo: Gained carrier Dec 13 14:22:15.999325 systemd-networkd[1026]: Enumeration completed Dec 13 14:22:15.999420 systemd[1]: Started systemd-networkd.service. Dec 13 14:22:15.999618 systemd-networkd[1026]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:22:15.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.001777 systemd-networkd[1026]: eth0: Link UP Dec 13 14:22:16.001787 systemd-networkd[1026]: eth0: Gained carrier Dec 13 14:22:16.008860 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:22:16.015992 systemd-networkd[1026]: eth0: DHCPv4 address 10.0.0.66/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:22:16.017768 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 14:22:16.019654 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 14:22:16.019808 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 14:22:16.041866 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:22:16.087404 kernel: kvm: Nested Virtualization enabled Dec 13 14:22:16.087489 kernel: SVM: kvm: Nested Paging enabled Dec 13 14:22:16.087509 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 14:22:16.087526 kernel: SVM: Virtual GIF supported Dec 13 14:22:16.100863 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:22:16.127186 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:22:16.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.129159 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:22:16.135725 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:22:16.160676 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:22:16.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.161807 systemd[1]: Reached target cryptsetup.target. Dec 13 14:22:16.163708 systemd[1]: Starting lvm2-activation.service... Dec 13 14:22:16.167118 lvm[1057]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:22:16.191871 systemd[1]: Finished lvm2-activation.service. Dec 13 14:22:16.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.192883 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:22:16.193730 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:22:16.193752 systemd[1]: Reached target local-fs.target. Dec 13 14:22:16.194722 systemd[1]: Reached target machines.target. Dec 13 14:22:16.196513 systemd[1]: Starting ldconfig.service... Dec 13 14:22:16.197506 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.197535 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:16.198213 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:22:16.199794 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:22:16.201831 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:22:16.203870 systemd[1]: Starting systemd-sysext.service... Dec 13 14:22:16.206588 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:22:16.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.210973 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1059 (bootctl) Dec 13 14:22:16.212966 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:22:16.215414 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:22:16.219068 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:22:16.219249 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:22:16.226861 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:22:16.246006 systemd-fsck[1067]: fsck.fat 4.2 (2021-01-31) Dec 13 14:22:16.246006 systemd-fsck[1067]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 14:22:16.247659 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:22:16.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.253366 systemd[1]: Mounting boot.mount... Dec 13 14:22:16.380935 systemd[1]: Mounted boot.mount. Dec 13 14:22:16.389864 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:22:16.392041 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:22:16.392719 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:22:16.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.396618 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:22:16.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.406874 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:22:16.410530 (sd-sysext)[1072]: Using extensions 'kubernetes'. Dec 13 14:22:16.410854 (sd-sysext)[1072]: Merged extensions into '/usr'. Dec 13 14:22:16.425940 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.427088 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:16.428788 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:16.430650 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:16.431664 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.431802 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:16.432576 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:16.432698 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:16.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.435230 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:16.435359 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:16.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.437049 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:16.437184 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:16.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.438783 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:16.440180 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:22:16.441237 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:16.441376 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.441472 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:16.444932 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:22:16.446909 systemd[1]: Finished systemd-sysext.service. Dec 13 14:22:16.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.448923 systemd[1]: Starting ensure-sysext.service... Dec 13 14:22:16.450666 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:22:16.454560 ldconfig[1058]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:22:16.455722 systemd[1]: Reloading. Dec 13 14:22:16.461731 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:22:16.463157 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:22:16.471195 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:22:16.509010 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-12-13T14:22:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:22:16.509048 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-12-13T14:22:16Z" level=info msg="torcx already run" Dec 13 14:22:16.574360 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:22:16.574386 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:22:16.592157 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:22:16.643000 audit: BPF prog-id=24 op=LOAD Dec 13 14:22:16.643000 audit: BPF prog-id=25 op=LOAD Dec 13 14:22:16.643000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:22:16.643000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:22:16.644000 audit: BPF prog-id=26 op=LOAD Dec 13 14:22:16.644000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:22:16.644000 audit: BPF prog-id=27 op=LOAD Dec 13 14:22:16.644000 audit: BPF prog-id=28 op=LOAD Dec 13 14:22:16.644000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:22:16.644000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:22:16.645000 audit: BPF prog-id=29 op=LOAD Dec 13 14:22:16.645000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:22:16.645000 audit: BPF prog-id=30 op=LOAD Dec 13 14:22:16.645000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:22:16.646000 audit: BPF prog-id=31 op=LOAD Dec 13 14:22:16.646000 audit: BPF prog-id=32 op=LOAD Dec 13 14:22:16.646000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:22:16.646000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:22:16.648968 systemd[1]: Finished ldconfig.service. Dec 13 14:22:16.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.650686 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:22:16.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.654020 systemd[1]: Starting audit-rules.service... Dec 13 14:22:16.655769 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:22:16.657620 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:22:16.658000 audit: BPF prog-id=33 op=LOAD Dec 13 14:22:16.660390 systemd[1]: Starting systemd-resolved.service... Dec 13 14:22:16.661000 audit: BPF prog-id=34 op=LOAD Dec 13 14:22:16.663280 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:22:16.664879 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:22:16.666188 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:22:16.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.669000 audit[1152]: SYSTEM_BOOT pid=1152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.668978 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:22:16.670381 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:16.670551 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.671539 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:16.673229 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:16.675146 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:16.675985 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.676102 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:16.676183 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:22:16.676255 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:16.677251 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:22:16.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.678671 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:16.678775 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:16.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.680003 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:16.680112 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:16.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.681385 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:16.681480 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:16.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:16.684085 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:16.684229 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.685360 systemd[1]: Starting systemd-update-done.service... Dec 13 14:22:16.687000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:22:16.687000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea3b16200 a2=420 a3=0 items=0 ppid=1141 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:16.687000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:22:16.688636 augenrules[1165]: No rules Dec 13 14:22:16.690318 systemd[1]: Finished audit-rules.service. Dec 13 14:22:16.691536 systemd[1]: Finished systemd-update-done.service. Dec 13 14:22:16.693246 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:22:16.694344 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:16.694512 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.695390 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:16.697201 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:16.698754 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:16.699513 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.699608 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:16.699688 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:22:16.699748 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:16.700560 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:16.700667 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:16.701794 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:16.701910 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:16.703125 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:16.703216 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:16.706203 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:16.706394 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.707491 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:16.709197 systemd[1]: Starting modprobe@drm.service... Dec 13 14:22:16.710811 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:16.712807 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:16.713588 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.713699 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:16.714957 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:22:16.715874 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:22:16.715967 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:16.716936 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:16.717039 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:16.718156 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:22:16.718244 systemd[1]: Finished modprobe@drm.service. Dec 13 14:22:16.719333 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:16.719422 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:16.720658 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:16.720745 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:16.721983 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:16.722072 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.723065 systemd[1]: Finished ensure-sysext.service. Dec 13 14:22:16.724805 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:22:16.725719 systemd-resolved[1147]: Positive Trust Anchors: Dec 13 14:22:16.725731 systemd-resolved[1147]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:22:16.725760 systemd-resolved[1147]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:22:16.725868 systemd[1]: Reached target time-set.target. Dec 13 14:22:16.726229 systemd-timesyncd[1151]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 14:22:16.726264 systemd-timesyncd[1151]: Initial clock synchronization to Fri 2024-12-13 14:22:16.797923 UTC. Dec 13 14:22:16.733904 systemd-resolved[1147]: Defaulting to hostname 'linux'. Dec 13 14:22:16.735302 systemd[1]: Started systemd-resolved.service. Dec 13 14:22:16.736191 systemd[1]: Reached target network.target. Dec 13 14:22:16.736969 systemd[1]: Reached target nss-lookup.target. Dec 13 14:22:16.737942 systemd[1]: Reached target sysinit.target. Dec 13 14:22:16.738886 systemd[1]: Started motdgen.path. Dec 13 14:22:16.739616 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:22:16.740836 systemd[1]: Started logrotate.timer. Dec 13 14:22:16.741736 systemd[1]: Started mdadm.timer. Dec 13 14:22:16.742437 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:22:16.743318 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:22:16.743333 systemd[1]: Reached target paths.target. Dec 13 14:22:16.744171 systemd[1]: Reached target timers.target. Dec 13 14:22:16.745234 systemd[1]: Listening on dbus.socket. Dec 13 14:22:16.746832 systemd[1]: Starting docker.socket... Dec 13 14:22:16.749435 systemd[1]: Listening on sshd.socket. Dec 13 14:22:16.750277 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:16.750596 systemd[1]: Listening on docker.socket. Dec 13 14:22:16.751413 systemd[1]: Reached target sockets.target. Dec 13 14:22:16.752215 systemd[1]: Reached target basic.target. Dec 13 14:22:16.752995 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.753019 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:22:16.753739 systemd[1]: Starting containerd.service... Dec 13 14:22:16.755277 systemd[1]: Starting dbus.service... Dec 13 14:22:16.756760 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:22:16.758412 systemd[1]: Starting extend-filesystems.service... Dec 13 14:22:16.759375 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:22:16.760228 systemd[1]: Starting motdgen.service... Dec 13 14:22:16.761869 systemd[1]: Starting prepare-helm.service... Dec 13 14:22:16.763502 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:22:16.763854 jq[1183]: false Dec 13 14:22:16.765200 systemd[1]: Starting sshd-keygen.service... Dec 13 14:22:16.770713 systemd[1]: Starting systemd-logind.service... Dec 13 14:22:16.771546 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:16.771593 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:22:16.771928 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:22:16.772472 systemd[1]: Starting update-engine.service... Dec 13 14:22:16.774129 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:22:16.775583 extend-filesystems[1184]: Found loop1 Dec 13 14:22:16.775583 extend-filesystems[1184]: Found sr0 Dec 13 14:22:16.775583 extend-filesystems[1184]: Found vda Dec 13 14:22:16.775583 extend-filesystems[1184]: Found vda1 Dec 13 14:22:16.784740 dbus-daemon[1182]: [system] SELinux support is enabled Dec 13 14:22:16.787417 extend-filesystems[1184]: Found vda2 Dec 13 14:22:16.787417 extend-filesystems[1184]: Found vda3 Dec 13 14:22:16.787417 extend-filesystems[1184]: Found usr Dec 13 14:22:16.787417 extend-filesystems[1184]: Found vda4 Dec 13 14:22:16.787417 extend-filesystems[1184]: Found vda6 Dec 13 14:22:16.787417 extend-filesystems[1184]: Found vda7 Dec 13 14:22:16.787417 extend-filesystems[1184]: Found vda9 Dec 13 14:22:16.787417 extend-filesystems[1184]: Checking size of /dev/vda9 Dec 13 14:22:16.776645 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:22:16.802145 jq[1199]: true Dec 13 14:22:16.802439 extend-filesystems[1184]: Resized partition /dev/vda9 Dec 13 14:22:16.776788 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:22:16.777889 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:22:16.804237 tar[1201]: linux-amd64/helm Dec 13 14:22:16.778036 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:22:16.783090 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:22:16.804740 jq[1204]: true Dec 13 14:22:16.783229 systemd[1]: Finished motdgen.service. Dec 13 14:22:16.785076 systemd[1]: Started dbus.service. Dec 13 14:22:16.787701 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:22:16.787715 systemd[1]: Reached target system-config.target. Dec 13 14:22:16.789194 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:22:16.789208 systemd[1]: Reached target user-config.target. Dec 13 14:22:16.805775 extend-filesystems[1222]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:22:16.810883 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 14:22:16.823626 update_engine[1198]: I1213 14:22:16.823267 1198 main.cc:92] Flatcar Update Engine starting Dec 13 14:22:16.825366 systemd[1]: Started update-engine.service. Dec 13 14:22:16.825570 update_engine[1198]: I1213 14:22:16.825390 1198 update_check_scheduler.cc:74] Next update check in 2m22s Dec 13 14:22:16.828318 systemd[1]: Started locksmithd.service. Dec 13 14:22:16.842027 env[1206]: time="2024-12-13T14:22:16.840507836Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:22:16.845868 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 14:22:16.862711 env[1206]: time="2024-12-13T14:22:16.862675278Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:22:16.869934 env[1206]: time="2024-12-13T14:22:16.869714218Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:16.870071 extend-filesystems[1222]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:22:16.870071 extend-filesystems[1222]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:22:16.870071 extend-filesystems[1222]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 14:22:16.878957 extend-filesystems[1184]: Resized filesystem in /dev/vda9 Dec 13 14:22:16.880611 bash[1234]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:22:16.870157 systemd-logind[1197]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876307203Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876332901Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876534078Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876549176Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876560688Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876569885Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876629968Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876818051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876949958Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:22:16.880984 env[1206]: time="2024-12-13T14:22:16.876972500Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:22:16.870176 systemd-logind[1197]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:22:16.881336 env[1206]: time="2024-12-13T14:22:16.877023917Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:22:16.881336 env[1206]: time="2024-12-13T14:22:16.877033815Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:22:16.870383 systemd-logind[1197]: New seat seat0. Dec 13 14:22:16.872488 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:22:16.872828 systemd[1]: Finished extend-filesystems.service. Dec 13 14:22:16.878538 systemd[1]: Started systemd-logind.service. Dec 13 14:22:16.881294 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887126974Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887173661Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887189270Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887229706Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887248281Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887266114Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887281133Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887299407Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887323262Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887339372Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887354891Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887370741Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887493461Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:22:16.887791 env[1206]: time="2024-12-13T14:22:16.887566358Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.887945398Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.887987026Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888000281Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888056016Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888067708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888079089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888092935Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888105068Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888115748Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888126348Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888135986Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888150072Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:22:16.888268 env[1206]: time="2024-12-13T14:22:16.888267092Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888619 env[1206]: time="2024-12-13T14:22:16.888282200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888619 env[1206]: time="2024-12-13T14:22:16.888312537Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888619 env[1206]: time="2024-12-13T14:22:16.888323447Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:22:16.888619 env[1206]: time="2024-12-13T14:22:16.888336512Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:22:16.888619 env[1206]: time="2024-12-13T14:22:16.888347012Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:22:16.888619 env[1206]: time="2024-12-13T14:22:16.888363803Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:22:16.888619 env[1206]: time="2024-12-13T14:22:16.888399590Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:22:16.888817 env[1206]: time="2024-12-13T14:22:16.888590368Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:22:16.888817 env[1206]: time="2024-12-13T14:22:16.888642415Z" level=info msg="Connect containerd service" Dec 13 14:22:16.888817 env[1206]: time="2024-12-13T14:22:16.888676469Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:22:16.889534 env[1206]: time="2024-12-13T14:22:16.889313524Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:22:16.889619 env[1206]: time="2024-12-13T14:22:16.889600021Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:22:16.889649 env[1206]: time="2024-12-13T14:22:16.889640377Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:22:16.889728 systemd[1]: Started containerd.service. Dec 13 14:22:16.890989 env[1206]: time="2024-12-13T14:22:16.889901096Z" level=info msg="Start subscribing containerd event" Dec 13 14:22:16.890989 env[1206]: time="2024-12-13T14:22:16.889950889Z" level=info msg="Start recovering state" Dec 13 14:22:16.890989 env[1206]: time="2024-12-13T14:22:16.890022123Z" level=info msg="Start event monitor" Dec 13 14:22:16.890989 env[1206]: time="2024-12-13T14:22:16.890034476Z" level=info msg="Start snapshots syncer" Dec 13 14:22:16.890989 env[1206]: time="2024-12-13T14:22:16.890044926Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:22:16.890989 env[1206]: time="2024-12-13T14:22:16.890055776Z" level=info msg="Start streaming server" Dec 13 14:22:16.891182 env[1206]: time="2024-12-13T14:22:16.891131443Z" level=info msg="containerd successfully booted in 0.061753s" Dec 13 14:22:16.904618 locksmithd[1235]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:22:17.198953 tar[1201]: linux-amd64/LICENSE Dec 13 14:22:17.199207 tar[1201]: linux-amd64/README.md Dec 13 14:22:17.203580 systemd[1]: Finished prepare-helm.service. Dec 13 14:22:17.577997 systemd-networkd[1026]: eth0: Gained IPv6LL Dec 13 14:22:17.579701 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:22:17.581062 systemd[1]: Reached target network-online.target. Dec 13 14:22:17.583215 systemd[1]: Starting kubelet.service... Dec 13 14:22:17.878109 sshd_keygen[1208]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:22:17.896457 systemd[1]: Finished sshd-keygen.service. Dec 13 14:22:17.898995 systemd[1]: Starting issuegen.service... Dec 13 14:22:17.904347 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:22:17.904551 systemd[1]: Finished issuegen.service. Dec 13 14:22:17.907365 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:22:17.912673 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:22:17.915525 systemd[1]: Started getty@tty1.service. Dec 13 14:22:17.917805 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:22:17.919407 systemd[1]: Reached target getty.target. Dec 13 14:22:18.161581 systemd[1]: Started kubelet.service. Dec 13 14:22:18.162889 systemd[1]: Reached target multi-user.target. Dec 13 14:22:18.165048 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:22:18.172980 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:22:18.173129 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:22:18.174315 systemd[1]: Startup finished in 648ms (kernel) + 5.131s (initrd) + 5.318s (userspace) = 11.098s. Dec 13 14:22:18.657270 kubelet[1263]: E1213 14:22:18.657152 1263 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:22:18.658510 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:22:18.658634 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:22:26.475578 systemd[1]: Created slice system-sshd.slice. Dec 13 14:22:26.476715 systemd[1]: Started sshd@0-10.0.0.66:22-10.0.0.1:37138.service. Dec 13 14:22:26.515239 sshd[1272]: Accepted publickey for core from 10.0.0.1 port 37138 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:22:26.516519 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:26.524343 systemd-logind[1197]: New session 1 of user core. Dec 13 14:22:26.525346 systemd[1]: Created slice user-500.slice. Dec 13 14:22:26.526380 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:22:26.534538 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:22:26.535948 systemd[1]: Starting user@500.service... Dec 13 14:22:26.539128 (systemd)[1275]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:26.632469 systemd[1275]: Queued start job for default target default.target. Dec 13 14:22:26.633086 systemd[1275]: Reached target paths.target. Dec 13 14:22:26.633112 systemd[1275]: Reached target sockets.target. Dec 13 14:22:26.633128 systemd[1275]: Reached target timers.target. Dec 13 14:22:26.633143 systemd[1275]: Reached target basic.target. Dec 13 14:22:26.633187 systemd[1275]: Reached target default.target. Dec 13 14:22:26.633215 systemd[1275]: Startup finished in 87ms. Dec 13 14:22:26.633377 systemd[1]: Started user@500.service. Dec 13 14:22:26.634681 systemd[1]: Started session-1.scope. Dec 13 14:22:26.686356 systemd[1]: Started sshd@1-10.0.0.66:22-10.0.0.1:37144.service. Dec 13 14:22:26.722782 sshd[1284]: Accepted publickey for core from 10.0.0.1 port 37144 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:22:26.724276 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:26.727901 systemd-logind[1197]: New session 2 of user core. Dec 13 14:22:26.728987 systemd[1]: Started session-2.scope. Dec 13 14:22:26.783227 sshd[1284]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:26.786145 systemd[1]: sshd@1-10.0.0.66:22-10.0.0.1:37144.service: Deactivated successfully. Dec 13 14:22:26.786685 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:22:26.787165 systemd-logind[1197]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:22:26.788165 systemd[1]: Started sshd@2-10.0.0.66:22-10.0.0.1:37158.service. Dec 13 14:22:26.788921 systemd-logind[1197]: Removed session 2. Dec 13 14:22:26.820711 sshd[1290]: Accepted publickey for core from 10.0.0.1 port 37158 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:22:26.821738 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:26.824756 systemd-logind[1197]: New session 3 of user core. Dec 13 14:22:26.825709 systemd[1]: Started session-3.scope. Dec 13 14:22:26.875955 sshd[1290]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:26.879387 systemd[1]: sshd@2-10.0.0.66:22-10.0.0.1:37158.service: Deactivated successfully. Dec 13 14:22:26.880083 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:22:26.880735 systemd-logind[1197]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:22:26.882076 systemd[1]: Started sshd@3-10.0.0.66:22-10.0.0.1:37168.service. Dec 13 14:22:26.882983 systemd-logind[1197]: Removed session 3. Dec 13 14:22:26.916185 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 37168 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:22:26.917221 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:26.920882 systemd-logind[1197]: New session 4 of user core. Dec 13 14:22:26.921589 systemd[1]: Started session-4.scope. Dec 13 14:22:26.976673 sshd[1296]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:26.979643 systemd[1]: sshd@3-10.0.0.66:22-10.0.0.1:37168.service: Deactivated successfully. Dec 13 14:22:26.980115 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:22:26.980663 systemd-logind[1197]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:22:26.981770 systemd[1]: Started sshd@4-10.0.0.66:22-10.0.0.1:37178.service. Dec 13 14:22:26.982537 systemd-logind[1197]: Removed session 4. Dec 13 14:22:27.014633 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 37178 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:22:27.015633 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:27.019447 systemd-logind[1197]: New session 5 of user core. Dec 13 14:22:27.020167 systemd[1]: Started session-5.scope. Dec 13 14:22:27.299170 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:22:27.299427 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:27.309103 dbus-daemon[1182]: \xd0mU\xf6\u0016V: received setenforce notice (enforcing=2040589680) Dec 13 14:22:27.311214 sudo[1306]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:27.313029 sshd[1302]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:27.316550 systemd[1]: Started sshd@5-10.0.0.66:22-10.0.0.1:37190.service. Dec 13 14:22:27.317043 systemd[1]: sshd@4-10.0.0.66:22-10.0.0.1:37178.service: Deactivated successfully. Dec 13 14:22:27.317566 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:22:27.318233 systemd-logind[1197]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:22:27.319270 systemd-logind[1197]: Removed session 5. Dec 13 14:22:27.351154 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 37190 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:22:27.352510 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:27.355938 systemd-logind[1197]: New session 6 of user core. Dec 13 14:22:27.356869 systemd[1]: Started session-6.scope. Dec 13 14:22:27.410478 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:22:27.410747 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:27.413330 sudo[1314]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:27.417199 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:22:27.417382 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:27.425452 systemd[1]: Stopping audit-rules.service... Dec 13 14:22:27.425000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:22:27.426628 auditctl[1317]: No rules Dec 13 14:22:27.426989 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:22:27.427107 systemd[1]: Stopped audit-rules.service. Dec 13 14:22:27.428213 kernel: kauditd_printk_skb: 267 callbacks suppressed Dec 13 14:22:27.428267 kernel: audit: type=1305 audit(1734099747.425:188): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:22:27.428559 systemd[1]: Starting audit-rules.service... Dec 13 14:22:27.425000 audit[1317]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd10b9fc0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.434480 kernel: audit: type=1300 audit(1734099747.425:188): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd10b9fc0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.434534 kernel: audit: type=1327 audit(1734099747.425:188): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:22:27.425000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:22:27.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.438866 kernel: audit: type=1131 audit(1734099747.425:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.442275 augenrules[1334]: No rules Dec 13 14:22:27.442802 systemd[1]: Finished audit-rules.service. Dec 13 14:22:27.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.443647 sudo[1313]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:27.444883 sshd[1309]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:27.442000 audit[1313]: USER_END pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.447338 systemd[1]: sshd@5-10.0.0.66:22-10.0.0.1:37190.service: Deactivated successfully. Dec 13 14:22:27.447875 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:22:27.448428 systemd-logind[1197]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:22:27.449256 systemd[1]: Started sshd@6-10.0.0.66:22-10.0.0.1:37200.service. Dec 13 14:22:27.449972 kernel: audit: type=1130 audit(1734099747.442:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.450015 kernel: audit: type=1106 audit(1734099747.442:191): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.450031 kernel: audit: type=1104 audit(1734099747.442:192): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.442000 audit[1313]: CRED_DISP pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.451595 systemd-logind[1197]: Removed session 6. Dec 13 14:22:27.453197 kernel: audit: type=1106 audit(1734099747.442:193): pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:27.442000 audit[1309]: USER_END pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:27.442000 audit[1309]: CRED_DISP pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:27.460938 kernel: audit: type=1104 audit(1734099747.442:194): pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:27.460978 kernel: audit: type=1131 audit(1734099747.445:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.66:22-10.0.0.1:37190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.66:22-10.0.0.1:37190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.66:22-10.0.0.1:37200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.481000 audit[1340]: USER_ACCT pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:27.482439 sshd[1340]: Accepted publickey for core from 10.0.0.1 port 37200 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:22:27.482000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:27.482000 audit[1340]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1a9f1870 a2=3 a3=0 items=0 ppid=1 pid=1340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:27.483395 sshd[1340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:27.486588 systemd-logind[1197]: New session 7 of user core. Dec 13 14:22:27.487381 systemd[1]: Started session-7.scope. Dec 13 14:22:27.489000 audit[1340]: USER_START pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:27.490000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:27.535000 audit[1343]: USER_ACCT pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.536000 audit[1343]: CRED_REFR pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.537820 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:22:27.538082 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:27.537000 audit[1343]: USER_START pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.556912 systemd[1]: Starting docker.service... Dec 13 14:22:27.593889 env[1355]: time="2024-12-13T14:22:27.593816249Z" level=info msg="Starting up" Dec 13 14:22:27.595126 env[1355]: time="2024-12-13T14:22:27.595085040Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:22:27.595126 env[1355]: time="2024-12-13T14:22:27.595102222Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:22:27.595126 env[1355]: time="2024-12-13T14:22:27.595119958Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:22:27.595126 env[1355]: time="2024-12-13T14:22:27.595128935Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:22:27.597033 env[1355]: time="2024-12-13T14:22:27.596999810Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:22:27.597033 env[1355]: time="2024-12-13T14:22:27.597022225Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:22:27.597149 env[1355]: time="2024-12-13T14:22:27.597040070Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:22:27.597149 env[1355]: time="2024-12-13T14:22:27.597051167Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:22:27.601470 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2461531342-merged.mount: Deactivated successfully. Dec 13 14:22:27.632606 env[1355]: time="2024-12-13T14:22:27.632558117Z" level=info msg="Loading containers: start." Dec 13 14:22:27.685000 audit[1389]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.685000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffecc7a03e0 a2=0 a3=7ffecc7a03cc items=0 ppid=1355 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:22:27.687000 audit[1391]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.687000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd7d234200 a2=0 a3=7ffd7d2341ec items=0 ppid=1355 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:22:27.688000 audit[1393]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.688000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd37be7870 a2=0 a3=7ffd37be785c items=0 ppid=1355 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:22:27.690000 audit[1395]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.690000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc711b01d0 a2=0 a3=7ffc711b01bc items=0 ppid=1355 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.690000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:22:27.691000 audit[1397]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.691000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde7a5b490 a2=0 a3=7ffde7a5b47c items=0 ppid=1355 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:22:27.714000 audit[1402]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.714000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca5f90fb0 a2=0 a3=7ffca5f90f9c items=0 ppid=1355 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.714000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:22:27.722000 audit[1404]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.722000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd67627170 a2=0 a3=7ffd6762715c items=0 ppid=1355 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.722000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:22:27.724000 audit[1406]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.724000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffce384f4a0 a2=0 a3=7ffce384f48c items=0 ppid=1355 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:22:27.726000 audit[1408]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.726000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe53a22030 a2=0 a3=7ffe53a2201c items=0 ppid=1355 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.726000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:27.735000 audit[1412]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.735000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd3f226070 a2=0 a3=7ffd3f22605c items=0 ppid=1355 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.735000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:27.742000 audit[1413]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.742000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd935a25f0 a2=0 a3=7ffd935a25dc items=0 ppid=1355 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.742000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:27.752870 kernel: Initializing XFRM netlink socket Dec 13 14:22:27.783585 env[1355]: time="2024-12-13T14:22:27.783537890Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:22:27.799000 audit[1421]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.799000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffec7876fa0 a2=0 a3=7ffec7876f8c items=0 ppid=1355 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:22:27.809000 audit[1424]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.809000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc262436a0 a2=0 a3=7ffc2624368c items=0 ppid=1355 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:22:27.811000 audit[1427]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.811000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdb0b5d0c0 a2=0 a3=7ffdb0b5d0ac items=0 ppid=1355 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.811000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:22:27.813000 audit[1429]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.813000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffec8ba50e0 a2=0 a3=7ffec8ba50cc items=0 ppid=1355 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.813000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:22:27.814000 audit[1431]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.814000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd70883ea0 a2=0 a3=7ffd70883e8c items=0 ppid=1355 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.814000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:22:27.816000 audit[1433]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.816000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdd110bf20 a2=0 a3=7ffdd110bf0c items=0 ppid=1355 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:22:27.817000 audit[1435]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.817000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe5aa48b00 a2=0 a3=7ffe5aa48aec items=0 ppid=1355 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.817000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:22:27.823000 audit[1438]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.823000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffecd3f3290 a2=0 a3=7ffecd3f327c items=0 ppid=1355 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.823000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:22:27.824000 audit[1440]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.824000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc5672d310 a2=0 a3=7ffc5672d2fc items=0 ppid=1355 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.824000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:22:27.825000 audit[1442]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.825000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc17fed090 a2=0 a3=7ffc17fed07c items=0 ppid=1355 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.825000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:22:27.827000 audit[1444]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.827000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe963b41e0 a2=0 a3=7ffe963b41cc items=0 ppid=1355 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.827000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:22:27.828384 systemd-networkd[1026]: docker0: Link UP Dec 13 14:22:27.836000 audit[1448]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.836000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1478bb50 a2=0 a3=7fff1478bb3c items=0 ppid=1355 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.836000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:27.841000 audit[1449]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:27.841000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcaca42f30 a2=0 a3=7ffcaca42f1c items=0 ppid=1355 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.841000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:27.842900 env[1355]: time="2024-12-13T14:22:27.842868491Z" level=info msg="Loading containers: done." Dec 13 14:22:27.857380 env[1355]: time="2024-12-13T14:22:27.857322296Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:22:27.857560 env[1355]: time="2024-12-13T14:22:27.857525223Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:22:27.857648 env[1355]: time="2024-12-13T14:22:27.857623257Z" level=info msg="Daemon has completed initialization" Dec 13 14:22:27.874960 systemd[1]: Started docker.service. Dec 13 14:22:27.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.878483 env[1355]: time="2024-12-13T14:22:27.878428044Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:22:28.556056 env[1206]: time="2024-12-13T14:22:28.555988971Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 14:22:28.909649 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:22:28.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:28.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:28.909908 systemd[1]: Stopped kubelet.service. Dec 13 14:22:28.911475 systemd[1]: Starting kubelet.service... Dec 13 14:22:29.006621 systemd[1]: Started kubelet.service. Dec 13 14:22:29.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.344119 kubelet[1489]: E1213 14:22:29.343986 1489 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:22:29.347338 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:22:29.347469 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:22:29.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:22:29.601881 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4029289702.mount: Deactivated successfully. Dec 13 14:22:31.734787 env[1206]: time="2024-12-13T14:22:31.734728589Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:31.736454 env[1206]: time="2024-12-13T14:22:31.736430928Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:31.738042 env[1206]: time="2024-12-13T14:22:31.738010337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:31.739571 env[1206]: time="2024-12-13T14:22:31.739548983Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:31.740267 env[1206]: time="2024-12-13T14:22:31.740235226Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 14:22:31.741615 env[1206]: time="2024-12-13T14:22:31.741586443Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 14:22:34.897240 env[1206]: time="2024-12-13T14:22:34.897169578Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:34.899638 env[1206]: time="2024-12-13T14:22:34.899553582Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:34.901858 env[1206]: time="2024-12-13T14:22:34.901788357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:34.903882 env[1206]: time="2024-12-13T14:22:34.903822000Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:34.904583 env[1206]: time="2024-12-13T14:22:34.904542227Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 14:22:34.905209 env[1206]: time="2024-12-13T14:22:34.905187232Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 14:22:36.896691 env[1206]: time="2024-12-13T14:22:36.896631616Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:36.898421 env[1206]: time="2024-12-13T14:22:36.898378408Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:36.900352 env[1206]: time="2024-12-13T14:22:36.900315672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:36.902303 env[1206]: time="2024-12-13T14:22:36.902273910Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:36.902823 env[1206]: time="2024-12-13T14:22:36.902794615Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 14:22:36.903345 env[1206]: time="2024-12-13T14:22:36.903307770Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:22:38.270103 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount554600202.mount: Deactivated successfully. Dec 13 14:22:39.467769 env[1206]: time="2024-12-13T14:22:39.467693332Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:39.469993 env[1206]: time="2024-12-13T14:22:39.469964028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:39.471954 env[1206]: time="2024-12-13T14:22:39.471913809Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:39.473566 env[1206]: time="2024-12-13T14:22:39.473539277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:39.473952 env[1206]: time="2024-12-13T14:22:39.473914830Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:22:39.474516 env[1206]: time="2024-12-13T14:22:39.474471899Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:22:39.598265 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:22:39.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:39.598518 systemd[1]: Stopped kubelet.service. Dec 13 14:22:39.599883 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:22:39.600020 kernel: audit: type=1130 audit(1734099759.596:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:39.599932 systemd[1]: Starting kubelet.service... Dec 13 14:22:39.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:39.607621 kernel: audit: type=1131 audit(1734099759.596:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:39.696922 systemd[1]: Started kubelet.service. Dec 13 14:22:39.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:39.701870 kernel: audit: type=1130 audit(1734099759.696:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:39.889957 kubelet[1502]: E1213 14:22:39.889795 1502 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:22:39.891863 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:22:39.892015 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:22:39.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:22:39.896885 kernel: audit: type=1131 audit(1734099759.891:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:22:40.185571 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount970200284.mount: Deactivated successfully. Dec 13 14:22:41.207807 env[1206]: time="2024-12-13T14:22:41.207732538Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:41.210027 env[1206]: time="2024-12-13T14:22:41.209981491Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:41.212499 env[1206]: time="2024-12-13T14:22:41.212458988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:41.224640 env[1206]: time="2024-12-13T14:22:41.224559834Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:41.225740 env[1206]: time="2024-12-13T14:22:41.225697992Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:22:41.226360 env[1206]: time="2024-12-13T14:22:41.226318570Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 14:22:41.899787 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1435354489.mount: Deactivated successfully. Dec 13 14:22:41.905354 env[1206]: time="2024-12-13T14:22:41.905315651Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:41.907610 env[1206]: time="2024-12-13T14:22:41.907568464Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:41.909119 env[1206]: time="2024-12-13T14:22:41.909087384Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:41.910543 env[1206]: time="2024-12-13T14:22:41.910505829Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:41.911027 env[1206]: time="2024-12-13T14:22:41.910993812Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 14:22:41.911520 env[1206]: time="2024-12-13T14:22:41.911499644Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 14:22:42.680590 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2003805463.mount: Deactivated successfully. Dec 13 14:22:45.593210 env[1206]: time="2024-12-13T14:22:45.593142508Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:45.595177 env[1206]: time="2024-12-13T14:22:45.595145681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:45.597179 env[1206]: time="2024-12-13T14:22:45.597150788Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:45.598830 env[1206]: time="2024-12-13T14:22:45.598805493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:45.599654 env[1206]: time="2024-12-13T14:22:45.599622980Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 14:22:48.116472 systemd[1]: Stopped kubelet.service. Dec 13 14:22:48.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.118424 systemd[1]: Starting kubelet.service... Dec 13 14:22:48.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.124879 kernel: audit: type=1130 audit(1734099768.115:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.125058 kernel: audit: type=1131 audit(1734099768.115:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.139079 systemd[1]: Reloading. Dec 13 14:22:48.200499 /usr/lib/systemd/system-generators/torcx-generator[1558]: time="2024-12-13T14:22:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:22:48.200920 /usr/lib/systemd/system-generators/torcx-generator[1558]: time="2024-12-13T14:22:48Z" level=info msg="torcx already run" Dec 13 14:22:48.368555 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:22:48.368570 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:22:48.385821 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:22:48.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.466575 kernel: audit: type=1400 audit(1734099768.458:240): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.466627 kernel: audit: type=1400 audit(1734099768.459:241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.466651 kernel: audit: type=1400 audit(1734099768.459:242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.469808 kernel: audit: type=1400 audit(1734099768.459:243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.476248 kernel: audit: type=1400 audit(1734099768.459:244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.476299 kernel: audit: type=1400 audit(1734099768.459:245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.482724 kernel: audit: type=1400 audit(1734099768.459:246): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.482777 kernel: audit: type=1400 audit(1734099768.459:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.465000 audit: BPF prog-id=40 op=LOAD Dec 13 14:22:48.465000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:22:48.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.472000 audit: BPF prog-id=41 op=LOAD Dec 13 14:22:48.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.478000 audit: BPF prog-id=42 op=LOAD Dec 13 14:22:48.478000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:22:48.478000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:22:48.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit: BPF prog-id=43 op=LOAD Dec 13 14:22:48.485000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit: BPF prog-id=44 op=LOAD Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.485000 audit: BPF prog-id=45 op=LOAD Dec 13 14:22:48.485000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:22:48.485000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.486000 audit: BPF prog-id=46 op=LOAD Dec 13 14:22:48.486000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.488000 audit: BPF prog-id=47 op=LOAD Dec 13 14:22:48.488000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit: BPF prog-id=48 op=LOAD Dec 13 14:22:48.489000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit: BPF prog-id=49 op=LOAD Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.489000 audit: BPF prog-id=50 op=LOAD Dec 13 14:22:48.489000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:22:48.489000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit: BPF prog-id=51 op=LOAD Dec 13 14:22:48.490000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit: BPF prog-id=52 op=LOAD Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.490000 audit: BPF prog-id=53 op=LOAD Dec 13 14:22:48.490000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:22:48.490000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:48.491000 audit: BPF prog-id=54 op=LOAD Dec 13 14:22:48.491000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:22:48.505109 systemd[1]: Started kubelet.service. Dec 13 14:22:48.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.506905 systemd[1]: Stopping kubelet.service... Dec 13 14:22:48.507197 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:22:48.507395 systemd[1]: Stopped kubelet.service. Dec 13 14:22:48.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.509224 systemd[1]: Starting kubelet.service... Dec 13 14:22:48.609076 systemd[1]: Started kubelet.service. Dec 13 14:22:48.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.644548 kubelet[1606]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:22:48.644548 kubelet[1606]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:22:48.644548 kubelet[1606]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:22:48.644938 kubelet[1606]: I1213 14:22:48.644559 1606 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:22:49.004490 kubelet[1606]: I1213 14:22:49.004400 1606 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:22:49.004490 kubelet[1606]: I1213 14:22:49.004426 1606 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:22:49.004671 kubelet[1606]: I1213 14:22:49.004654 1606 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:22:49.020546 kubelet[1606]: I1213 14:22:49.020524 1606 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:22:49.024754 kubelet[1606]: E1213 14:22:49.024734 1606 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.66:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:49.032647 kubelet[1606]: E1213 14:22:49.032615 1606 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:22:49.032647 kubelet[1606]: I1213 14:22:49.032638 1606 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:22:49.037153 kubelet[1606]: I1213 14:22:49.037139 1606 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:22:49.038443 kubelet[1606]: I1213 14:22:49.038422 1606 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:22:49.038582 kubelet[1606]: I1213 14:22:49.038549 1606 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:22:49.038719 kubelet[1606]: I1213 14:22:49.038576 1606 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:22:49.038873 kubelet[1606]: I1213 14:22:49.038722 1606 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:22:49.038873 kubelet[1606]: I1213 14:22:49.038730 1606 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:22:49.038873 kubelet[1606]: I1213 14:22:49.038823 1606 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:22:49.040545 kubelet[1606]: I1213 14:22:49.040526 1606 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:22:49.040545 kubelet[1606]: I1213 14:22:49.040547 1606 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:22:49.040626 kubelet[1606]: I1213 14:22:49.040575 1606 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:22:49.040626 kubelet[1606]: I1213 14:22:49.040594 1606 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:22:49.066988 kubelet[1606]: W1213 14:22:49.066955 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.66:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.66:6443: connect: connection refused Dec 13 14:22:49.067051 kubelet[1606]: E1213 14:22:49.066989 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.66:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:49.071607 kubelet[1606]: W1213 14:22:49.071536 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.66:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.66:6443: connect: connection refused Dec 13 14:22:49.071669 kubelet[1606]: E1213 14:22:49.071611 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.66:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:49.077504 kubelet[1606]: I1213 14:22:49.077471 1606 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:22:49.079064 kubelet[1606]: I1213 14:22:49.079042 1606 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:22:49.079578 kubelet[1606]: W1213 14:22:49.079555 1606 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:22:49.080306 kubelet[1606]: I1213 14:22:49.080075 1606 server.go:1269] "Started kubelet" Dec 13 14:22:49.080306 kubelet[1606]: I1213 14:22:49.080138 1606 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:22:49.080000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.080000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:22:49.080000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00074d890 a1=c000929590 a2=c00074d860 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.080000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:22:49.080000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.080000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:22:49.080000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009270e0 a1=c0009295a8 a2=c00074d920 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.080000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:22:49.081362 kubelet[1606]: I1213 14:22:49.081040 1606 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:22:49.081362 kubelet[1606]: I1213 14:22:49.081086 1606 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:22:49.081362 kubelet[1606]: I1213 14:22:49.081092 1606 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:22:49.081362 kubelet[1606]: I1213 14:22:49.081134 1606 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:22:49.082207 kubelet[1606]: I1213 14:22:49.081686 1606 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:22:49.082207 kubelet[1606]: I1213 14:22:49.081938 1606 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:22:49.082207 kubelet[1606]: I1213 14:22:49.082152 1606 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:22:49.082718 kubelet[1606]: I1213 14:22:49.082695 1606 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:22:49.082893 kubelet[1606]: E1213 14:22:49.082857 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:22:49.083248 kubelet[1606]: I1213 14:22:49.083217 1606 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:22:49.083366 kubelet[1606]: I1213 14:22:49.083257 1606 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:22:49.085256 kubelet[1606]: E1213 14:22:49.085186 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.66:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.66:6443: connect: connection refused" interval="200ms" Dec 13 14:22:49.085678 kubelet[1606]: I1213 14:22:49.085649 1606 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:22:49.085000 audit[1619]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:49.085000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcffb75300 a2=0 a3=7ffcffb752ec items=0 ppid=1606 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:22:49.086491 kubelet[1606]: W1213 14:22:49.086439 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.66:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.66:6443: connect: connection refused Dec 13 14:22:49.086551 kubelet[1606]: E1213 14:22:49.086498 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.66:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:49.088000 audit[1620]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:49.088000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd712ea240 a2=0 a3=7ffd712ea22c items=0 ppid=1606 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:22:49.090192 kubelet[1606]: I1213 14:22:49.090157 1606 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:22:49.090192 kubelet[1606]: I1213 14:22:49.090177 1606 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:22:49.090391 kubelet[1606]: E1213 14:22:49.090374 1606 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:22:49.090000 audit[1622]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:49.090000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc415fd800 a2=0 a3=7ffc415fd7ec items=0 ppid=1606 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:22:49.092486 kubelet[1606]: E1213 14:22:49.088633 1606 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.66:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.66:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c28d651a74e7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:22:49.080050919 +0000 UTC m=+0.467542694,LastTimestamp:2024-12-13 14:22:49.080050919 +0000 UTC m=+0.467542694,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:22:49.098000 audit[1625]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:49.098000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd61546340 a2=0 a3=7ffd6154632c items=0 ppid=1606 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:22:49.102384 kubelet[1606]: I1213 14:22:49.102362 1606 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:22:49.102384 kubelet[1606]: I1213 14:22:49.102382 1606 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:22:49.102462 kubelet[1606]: I1213 14:22:49.102401 1606 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:22:49.104000 audit[1631]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:49.104000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcaf1d6070 a2=0 a3=7ffcaf1d605c items=0 ppid=1606 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:22:49.105754 kubelet[1606]: I1213 14:22:49.105712 1606 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:22:49.105000 audit[1632]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:49.105000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff35096e20 a2=0 a3=7fff35096e0c items=0 ppid=1606 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:22:49.105000 audit[1633]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:49.105000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff5c3c00b0 a2=0 a3=7fff5c3c009c items=0 ppid=1606 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:22:49.106741 kubelet[1606]: I1213 14:22:49.106719 1606 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:22:49.106785 kubelet[1606]: I1213 14:22:49.106758 1606 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:22:49.106785 kubelet[1606]: I1213 14:22:49.106777 1606 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:22:49.106874 kubelet[1606]: E1213 14:22:49.106830 1606 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:22:49.107372 kubelet[1606]: W1213 14:22:49.107338 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.66:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.66:6443: connect: connection refused Dec 13 14:22:49.107416 kubelet[1606]: E1213 14:22:49.107381 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.66:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:49.106000 audit[1635]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:49.106000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7375de60 a2=0 a3=7ffc7375de4c items=0 ppid=1606 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:22:49.106000 audit[1636]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:49.106000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd09850520 a2=0 a3=7ffd0985050c items=0 ppid=1606 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:22:49.107000 audit[1637]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:49.107000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffeb779ea40 a2=0 a3=7ffeb779ea2c items=0 ppid=1606 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:22:49.107000 audit[1638]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:49.107000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe446479e0 a2=0 a3=7ffe446479cc items=0 ppid=1606 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:22:49.108000 audit[1639]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:22:49.108000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc9765f450 a2=0 a3=7ffc9765f43c items=0 ppid=1606 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:22:49.183103 kubelet[1606]: E1213 14:22:49.183070 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:22:49.207627 kubelet[1606]: E1213 14:22:49.207574 1606 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:22:49.284015 kubelet[1606]: E1213 14:22:49.283926 1606 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:22:49.286262 kubelet[1606]: E1213 14:22:49.286194 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.66:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.66:6443: connect: connection refused" interval="400ms" Dec 13 14:22:49.317331 kubelet[1606]: I1213 14:22:49.317271 1606 policy_none.go:49] "None policy: Start" Dec 13 14:22:49.317889 kubelet[1606]: I1213 14:22:49.317872 1606 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:22:49.317939 kubelet[1606]: I1213 14:22:49.317899 1606 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:22:49.326607 systemd[1]: Created slice kubepods.slice. Dec 13 14:22:49.330406 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:22:49.333070 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:22:49.341335 kubelet[1606]: I1213 14:22:49.341315 1606 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:22:49.340000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.340000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:22:49.340000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00078f800 a1=c0006a90e0 a2=c00078f7d0 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.340000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:22:49.341575 kubelet[1606]: I1213 14:22:49.341362 1606 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:22:49.341575 kubelet[1606]: I1213 14:22:49.341446 1606 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:22:49.341575 kubelet[1606]: I1213 14:22:49.341454 1606 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:22:49.341661 kubelet[1606]: I1213 14:22:49.341633 1606 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:22:49.342673 kubelet[1606]: E1213 14:22:49.342656 1606 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 14:22:49.413515 systemd[1]: Created slice kubepods-burstable-pod5fa8bbf5dfdeb2654a746a7db2cc748f.slice. Dec 13 14:22:49.431020 systemd[1]: Created slice kubepods-burstable-pod50a9ae38ddb3bec3278d8dc73a6a7009.slice. Dec 13 14:22:49.440637 systemd[1]: Created slice kubepods-burstable-poda52b86ce975f496e6002ba953fa9b888.slice. Dec 13 14:22:49.442151 kubelet[1606]: I1213 14:22:49.442118 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:22:49.442428 kubelet[1606]: E1213 14:22:49.442400 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.66:6443/api/v1/nodes\": dial tcp 10.0.0.66:6443: connect: connection refused" node="localhost" Dec 13 14:22:49.486763 kubelet[1606]: I1213 14:22:49.486732 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5fa8bbf5dfdeb2654a746a7db2cc748f-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5fa8bbf5dfdeb2654a746a7db2cc748f\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:22:49.486868 kubelet[1606]: I1213 14:22:49.486768 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5fa8bbf5dfdeb2654a746a7db2cc748f-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5fa8bbf5dfdeb2654a746a7db2cc748f\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:22:49.486868 kubelet[1606]: I1213 14:22:49.486789 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:49.486868 kubelet[1606]: I1213 14:22:49.486807 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:49.486945 kubelet[1606]: I1213 14:22:49.486874 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5fa8bbf5dfdeb2654a746a7db2cc748f-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5fa8bbf5dfdeb2654a746a7db2cc748f\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:22:49.486984 kubelet[1606]: I1213 14:22:49.486953 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:49.487023 kubelet[1606]: I1213 14:22:49.487001 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:49.487048 kubelet[1606]: I1213 14:22:49.487039 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:49.487081 kubelet[1606]: I1213 14:22:49.487064 1606 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:22:49.643912 kubelet[1606]: I1213 14:22:49.643793 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:22:49.644313 kubelet[1606]: E1213 14:22:49.644275 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.66:6443/api/v1/nodes\": dial tcp 10.0.0.66:6443: connect: connection refused" node="localhost" Dec 13 14:22:49.686782 kubelet[1606]: E1213 14:22:49.686744 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.66:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.66:6443: connect: connection refused" interval="800ms" Dec 13 14:22:49.730180 kubelet[1606]: E1213 14:22:49.730134 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:49.730781 env[1206]: time="2024-12-13T14:22:49.730727933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5fa8bbf5dfdeb2654a746a7db2cc748f,Namespace:kube-system,Attempt:0,}" Dec 13 14:22:49.740078 kubelet[1606]: E1213 14:22:49.740038 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:49.740567 env[1206]: time="2024-12-13T14:22:49.740532499Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,}" Dec 13 14:22:49.742780 kubelet[1606]: E1213 14:22:49.742749 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:49.743084 env[1206]: time="2024-12-13T14:22:49.743049286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,}" Dec 13 14:22:50.015177 kubelet[1606]: W1213 14:22:50.015020 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.66:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.66:6443: connect: connection refused Dec 13 14:22:50.015177 kubelet[1606]: E1213 14:22:50.015095 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.66:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:50.045540 kubelet[1606]: I1213 14:22:50.045501 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:22:50.045888 kubelet[1606]: E1213 14:22:50.045831 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.66:6443/api/v1/nodes\": dial tcp 10.0.0.66:6443: connect: connection refused" node="localhost" Dec 13 14:22:50.103362 kubelet[1606]: W1213 14:22:50.103300 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.66:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.66:6443: connect: connection refused Dec 13 14:22:50.103362 kubelet[1606]: E1213 14:22:50.103362 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.66:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:50.411365 kubelet[1606]: W1213 14:22:50.411250 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.66:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.66:6443: connect: connection refused Dec 13 14:22:50.411365 kubelet[1606]: E1213 14:22:50.411301 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.66:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:50.488145 kubelet[1606]: E1213 14:22:50.488106 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.66:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.66:6443: connect: connection refused" interval="1.6s" Dec 13 14:22:50.561777 kubelet[1606]: W1213 14:22:50.561716 1606 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.66:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.66:6443: connect: connection refused Dec 13 14:22:50.561777 kubelet[1606]: E1213 14:22:50.561772 1606 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.66:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:50.796258 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1138621903.mount: Deactivated successfully. Dec 13 14:22:50.847531 kubelet[1606]: I1213 14:22:50.847489 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:22:50.847861 kubelet[1606]: E1213 14:22:50.847781 1606 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.66:6443/api/v1/nodes\": dial tcp 10.0.0.66:6443: connect: connection refused" node="localhost" Dec 13 14:22:50.878430 env[1206]: time="2024-12-13T14:22:50.878344688Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.881282 env[1206]: time="2024-12-13T14:22:50.881231679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.882502 env[1206]: time="2024-12-13T14:22:50.882467878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.884262 env[1206]: time="2024-12-13T14:22:50.884236238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.885927 env[1206]: time="2024-12-13T14:22:50.885889305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.887717 env[1206]: time="2024-12-13T14:22:50.887686513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.888856 env[1206]: time="2024-12-13T14:22:50.888814123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.889975 env[1206]: time="2024-12-13T14:22:50.889954449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.891215 env[1206]: time="2024-12-13T14:22:50.891192782Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.892669 env[1206]: time="2024-12-13T14:22:50.892642420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.894883 env[1206]: time="2024-12-13T14:22:50.894857910Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.895610 env[1206]: time="2024-12-13T14:22:50.895585014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:50.921815 env[1206]: time="2024-12-13T14:22:50.920555913Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:50.921815 env[1206]: time="2024-12-13T14:22:50.920590892Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:50.921815 env[1206]: time="2024-12-13T14:22:50.920600432Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:50.921815 env[1206]: time="2024-12-13T14:22:50.920700895Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c47db41c5d46df57e45ef9b162cca946f75e3a9f483f3d89ed12fccb7a1160aa pid=1646 runtime=io.containerd.runc.v2 Dec 13 14:22:50.944933 env[1206]: time="2024-12-13T14:22:50.939433504Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:50.944933 env[1206]: time="2024-12-13T14:22:50.939500128Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:50.944933 env[1206]: time="2024-12-13T14:22:50.939513645Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:50.944933 env[1206]: time="2024-12-13T14:22:50.939654770Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d284fd890f7543f808a65188920392bc3cf875bfd50af569be240f947b010569 pid=1670 runtime=io.containerd.runc.v2 Dec 13 14:22:50.945233 env[1206]: time="2024-12-13T14:22:50.934773934Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:50.945233 env[1206]: time="2024-12-13T14:22:50.934811028Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:50.945233 env[1206]: time="2024-12-13T14:22:50.934820258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:50.945233 env[1206]: time="2024-12-13T14:22:50.935315985Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3c5737b49c9e294a36f5fe19aaa83042138888f64169b1ced4075197671c11f pid=1666 runtime=io.containerd.runc.v2 Dec 13 14:22:50.972623 systemd[1]: Started cri-containerd-c3c5737b49c9e294a36f5fe19aaa83042138888f64169b1ced4075197671c11f.scope. Dec 13 14:22:50.977237 systemd[1]: Started cri-containerd-d284fd890f7543f808a65188920392bc3cf875bfd50af569be240f947b010569.scope. Dec 13 14:22:51.017957 systemd[1]: Started cri-containerd-c47db41c5d46df57e45ef9b162cca946f75e3a9f483f3d89ed12fccb7a1160aa.scope. Dec 13 14:22:51.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit: BPF prog-id=55 op=LOAD Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1666 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333633537333762343963396532393461333666356665313961616138 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1666 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333633537333762343963396532393461333666356665313961616138 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit: BPF prog-id=56 op=LOAD Dec 13 14:22:51.078000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a92f0 items=0 ppid=1666 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333633537333762343963396532393461333666356665313961616138 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit: BPF prog-id=57 op=LOAD Dec 13 14:22:51.078000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a9338 items=0 ppid=1666 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333633537333762343963396532393461333666356665313961616138 Dec 13 14:22:51.078000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:22:51.078000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { perfmon } for pid=1690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit[1690]: AVC avc: denied { bpf } for pid=1690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.078000 audit: BPF prog-id=58 op=LOAD Dec 13 14:22:51.078000 audit[1690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a9748 items=0 ppid=1666 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333633537333762343963396532393461333666356665313961616138 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit: BPF prog-id=59 op=LOAD Dec 13 14:22:51.081000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1691]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1670 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383466643839306637353433663830386136353138383932303339 Dec 13 14:22:51.081000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.081000 audit[1691]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1670 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383466643839306637353433663830386136353138383932303339 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit: BPF prog-id=60 op=LOAD Dec 13 14:22:51.082000 audit[1691]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00034f000 items=0 ppid=1670 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383466643839306637353433663830386136353138383932303339 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit: BPF prog-id=61 op=LOAD Dec 13 14:22:51.082000 audit[1691]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00034f048 items=0 ppid=1670 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383466643839306637353433663830386136353138383932303339 Dec 13 14:22:51.082000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:22:51.082000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.082000 audit: BPF prog-id=62 op=LOAD Dec 13 14:22:51.082000 audit[1691]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00034f458 items=0 ppid=1670 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383466643839306637353433663830386136353138383932303339 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit: BPF prog-id=63 op=LOAD Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1646 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376462343163356434366466353765343565663962313632636361 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1646 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376462343163356434366466353765343565663962313632636361 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit: BPF prog-id=64 op=LOAD Dec 13 14:22:51.084000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00029e8d0 items=0 ppid=1646 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376462343163356434366466353765343565663962313632636361 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.084000 audit: BPF prog-id=65 op=LOAD Dec 13 14:22:51.084000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00029e918 items=0 ppid=1646 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376462343163356434366466353765343565663962313632636361 Dec 13 14:22:51.084000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:22:51.085000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { perfmon } for pid=1669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit[1669]: AVC avc: denied { bpf } for pid=1669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.085000 audit: BPF prog-id=66 op=LOAD Dec 13 14:22:51.085000 audit[1669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00029ed28 items=0 ppid=1646 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376462343163356434366466353765343565663962313632636361 Dec 13 14:22:51.112769 env[1206]: time="2024-12-13T14:22:51.112711858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,} returns sandbox id \"d284fd890f7543f808a65188920392bc3cf875bfd50af569be240f947b010569\"" Dec 13 14:22:51.113610 kubelet[1606]: E1213 14:22:51.113582 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:51.115743 env[1206]: time="2024-12-13T14:22:51.115711393Z" level=info msg="CreateContainer within sandbox \"d284fd890f7543f808a65188920392bc3cf875bfd50af569be240f947b010569\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:22:51.118890 env[1206]: time="2024-12-13T14:22:51.118860870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5fa8bbf5dfdeb2654a746a7db2cc748f,Namespace:kube-system,Attempt:0,} returns sandbox id \"c3c5737b49c9e294a36f5fe19aaa83042138888f64169b1ced4075197671c11f\"" Dec 13 14:22:51.119332 kubelet[1606]: E1213 14:22:51.119311 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:51.121085 env[1206]: time="2024-12-13T14:22:51.121062244Z" level=info msg="CreateContainer within sandbox \"c3c5737b49c9e294a36f5fe19aaa83042138888f64169b1ced4075197671c11f\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:22:51.123085 env[1206]: time="2024-12-13T14:22:51.123033718Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,} returns sandbox id \"c47db41c5d46df57e45ef9b162cca946f75e3a9f483f3d89ed12fccb7a1160aa\"" Dec 13 14:22:51.123714 kubelet[1606]: E1213 14:22:51.123697 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:51.125441 env[1206]: time="2024-12-13T14:22:51.125417399Z" level=info msg="CreateContainer within sandbox \"c47db41c5d46df57e45ef9b162cca946f75e3a9f483f3d89ed12fccb7a1160aa\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:22:51.144349 env[1206]: time="2024-12-13T14:22:51.144309246Z" level=info msg="CreateContainer within sandbox \"d284fd890f7543f808a65188920392bc3cf875bfd50af569be240f947b010569\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a22f82e7ce711393ca428a3bba408273ab3b41511ccd16ee959bb586051457f3\"" Dec 13 14:22:51.144757 env[1206]: time="2024-12-13T14:22:51.144722986Z" level=info msg="StartContainer for \"a22f82e7ce711393ca428a3bba408273ab3b41511ccd16ee959bb586051457f3\"" Dec 13 14:22:51.147710 env[1206]: time="2024-12-13T14:22:51.147661419Z" level=info msg="CreateContainer within sandbox \"c3c5737b49c9e294a36f5fe19aaa83042138888f64169b1ced4075197671c11f\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d63e229dd9ff88b5a16a5620e37bf6ec7c83b3c153fc65b17bd789d1a18ca4d6\"" Dec 13 14:22:51.148083 env[1206]: time="2024-12-13T14:22:51.148055058Z" level=info msg="StartContainer for \"d63e229dd9ff88b5a16a5620e37bf6ec7c83b3c153fc65b17bd789d1a18ca4d6\"" Dec 13 14:22:51.151951 env[1206]: time="2024-12-13T14:22:51.151912965Z" level=info msg="CreateContainer within sandbox \"c47db41c5d46df57e45ef9b162cca946f75e3a9f483f3d89ed12fccb7a1160aa\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"2ef6eef57db2b20db0ff60333fb9ee4428dfd91e95d3098393184974c6d569de\"" Dec 13 14:22:51.152260 env[1206]: time="2024-12-13T14:22:51.152224029Z" level=info msg="StartContainer for \"2ef6eef57db2b20db0ff60333fb9ee4428dfd91e95d3098393184974c6d569de\"" Dec 13 14:22:51.153890 kubelet[1606]: E1213 14:22:51.153818 1606 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.66:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:22:51.159827 systemd[1]: Started cri-containerd-a22f82e7ce711393ca428a3bba408273ab3b41511ccd16ee959bb586051457f3.scope. Dec 13 14:22:51.169156 systemd[1]: Started cri-containerd-d63e229dd9ff88b5a16a5620e37bf6ec7c83b3c153fc65b17bd789d1a18ca4d6.scope. Dec 13 14:22:51.176803 systemd[1]: Started cri-containerd-2ef6eef57db2b20db0ff60333fb9ee4428dfd91e95d3098393184974c6d569de.scope. Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.180000 audit: BPF prog-id=67 op=LOAD Dec 13 14:22:51.181000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.181000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1666 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436336532323964643966663838623561313661353632306533376266 Dec 13 14:22:51.181000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.181000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1666 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436336532323964643966663838623561313661353632306533376266 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit: BPF prog-id=68 op=LOAD Dec 13 14:22:51.182000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a91e0 items=0 ppid=1666 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436336532323964643966663838623561313661353632306533376266 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit: BPF prog-id=69 op=LOAD Dec 13 14:22:51.182000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a9228 items=0 ppid=1666 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436336532323964643966663838623561313661353632306533376266 Dec 13 14:22:51.182000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:22:51.182000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.182000 audit: BPF prog-id=70 op=LOAD Dec 13 14:22:51.182000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a9638 items=0 ppid=1666 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436336532323964643966663838623561313661353632306533376266 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.183000 audit: BPF prog-id=71 op=LOAD Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=1670 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132326638326537636537313133393363613432386133626261343038 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=1670 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132326638326537636537313133393363613432386133626261343038 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit: BPF prog-id=72 op=LOAD Dec 13 14:22:51.184000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0002215f0 items=0 ppid=1670 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132326638326537636537313133393363613432386133626261343038 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit: BPF prog-id=73 op=LOAD Dec 13 14:22:51.184000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000221638 items=0 ppid=1670 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132326638326537636537313133393363613432386133626261343038 Dec 13 14:22:51.184000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:22:51.184000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.184000 audit: BPF prog-id=74 op=LOAD Dec 13 14:22:51.184000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000221a48 items=0 ppid=1670 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132326638326537636537313133393363613432386133626261343038 Dec 13 14:22:51.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit: BPF prog-id=75 op=LOAD Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1646 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663665656635376462326232306462306666363033333366623965 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1646 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663665656635376462326232306462306666363033333366623965 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit: BPF prog-id=76 op=LOAD Dec 13 14:22:51.197000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000281730 items=0 ppid=1646 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663665656635376462326232306462306666363033333366623965 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.197000 audit: BPF prog-id=77 op=LOAD Dec 13 14:22:51.197000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000281778 items=0 ppid=1646 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663665656635376462326232306462306666363033333366623965 Dec 13 14:22:51.198000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:22:51.198000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.198000 audit: BPF prog-id=78 op=LOAD Dec 13 14:22:51.198000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000281b88 items=0 ppid=1646 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663665656635376462326232306462306666363033333366623965 Dec 13 14:22:51.270334 env[1206]: time="2024-12-13T14:22:51.270284790Z" level=info msg="StartContainer for \"d63e229dd9ff88b5a16a5620e37bf6ec7c83b3c153fc65b17bd789d1a18ca4d6\" returns successfully" Dec 13 14:22:51.275042 env[1206]: time="2024-12-13T14:22:51.275000727Z" level=info msg="StartContainer for \"a22f82e7ce711393ca428a3bba408273ab3b41511ccd16ee959bb586051457f3\" returns successfully" Dec 13 14:22:51.284891 env[1206]: time="2024-12-13T14:22:51.284831824Z" level=info msg="StartContainer for \"2ef6eef57db2b20db0ff60333fb9ee4428dfd91e95d3098393184974c6d569de\" returns successfully" Dec 13 14:22:51.888000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:51.888000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00046a280 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:22:51.888000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:51.889000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:51.889000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0006ce7b0 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:22:51.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:52.113780 kubelet[1606]: E1213 14:22:52.113675 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:52.115207 kubelet[1606]: E1213 14:22:52.115074 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:52.116431 kubelet[1606]: E1213 14:22:52.116400 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:52.369000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:52.369000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:52.369000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c004478000 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:22:52.369000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:22:52.370000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:52.370000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c00364f440 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:22:52.370000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:22:52.369000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003310520 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:22:52.369000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:22:52.371000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:52.371000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c003310620 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:22:52.371000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:22:52.372000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:52.372000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=55 a1=c004396510 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:22:52.372000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:22:52.372000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:52.372000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c004667260 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:22:52.372000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:22:52.397128 kubelet[1606]: E1213 14:22:52.397085 1606 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 14:22:52.449673 kubelet[1606]: I1213 14:22:52.449630 1606 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:22:52.517937 kubelet[1606]: I1213 14:22:52.517895 1606 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 14:22:52.517937 kubelet[1606]: E1213 14:22:52.517929 1606 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" Dec 13 14:22:53.061354 kubelet[1606]: I1213 14:22:53.061294 1606 apiserver.go:52] "Watching apiserver" Dec 13 14:22:53.083709 kubelet[1606]: I1213 14:22:53.083669 1606 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:22:53.132814 kubelet[1606]: E1213 14:22:53.132775 1606 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Dec 13 14:22:53.133163 kubelet[1606]: E1213 14:22:53.132984 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:55.055658 systemd[1]: Reloading. Dec 13 14:22:55.348381 /usr/lib/systemd/system-generators/torcx-generator[1896]: time="2024-12-13T14:22:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:22:55.348410 /usr/lib/systemd/system-generators/torcx-generator[1896]: time="2024-12-13T14:22:55Z" level=info msg="torcx already run" Dec 13 14:22:55.350035 kubelet[1606]: E1213 14:22:55.349993 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:55.380822 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:22:55.380852 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:22:55.401585 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:22:55.485930 kernel: kauditd_printk_skb: 581 callbacks suppressed Dec 13 14:22:55.486100 kernel: audit: type=1400 audit(1734099775.472:546): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.486130 kernel: audit: type=1400 audit(1734099775.472:547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.486159 kernel: audit: type=1400 audit(1734099775.472:548): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.489571 kernel: audit: type=1400 audit(1734099775.472:549): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.489616 kernel: audit: type=1400 audit(1734099775.472:550): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.495805 kernel: audit: type=1400 audit(1734099775.472:551): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.495854 kernel: audit: type=1400 audit(1734099775.472:552): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.499207 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:22:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.500215 kernel: audit: type=1400 audit(1734099775.472:553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.500301 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:22:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.477000 audit: BPF prog-id=79 op=LOAD Dec 13 14:22:55.477000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:22:55.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.481000 audit: BPF prog-id=80 op=LOAD Dec 13 14:22:55.481000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:22:55.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.485000 audit: BPF prog-id=81 op=LOAD Dec 13 14:22:55.485000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:22:55.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.488000 audit: BPF prog-id=82 op=LOAD Dec 13 14:22:55.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.491000 audit: BPF prog-id=83 op=LOAD Dec 13 14:22:55.491000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:22:55.491000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:22:55.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.494000 audit: BPF prog-id=84 op=LOAD Dec 13 14:22:55.494000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:22:55.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit: BPF prog-id=86 op=LOAD Dec 13 14:22:55.504000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:22:55.504000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.504000 audit: BPF prog-id=87 op=LOAD Dec 13 14:22:55.504000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit: BPF prog-id=88 op=LOAD Dec 13 14:22:55.505000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit: BPF prog-id=89 op=LOAD Dec 13 14:22:55.506000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit: BPF prog-id=90 op=LOAD Dec 13 14:22:55.507000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.507000 audit: BPF prog-id=91 op=LOAD Dec 13 14:22:55.507000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit: BPF prog-id=92 op=LOAD Dec 13 14:22:55.508000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit: BPF prog-id=93 op=LOAD Dec 13 14:22:55.509000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit: BPF prog-id=94 op=LOAD Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit: BPF prog-id=95 op=LOAD Dec 13 14:22:55.509000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:22:55.509000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit: BPF prog-id=96 op=LOAD Dec 13 14:22:55.509000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit: BPF prog-id=97 op=LOAD Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit: BPF prog-id=98 op=LOAD Dec 13 14:22:55.510000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:22:55.510000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.511000 audit: BPF prog-id=99 op=LOAD Dec 13 14:22:55.511000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:22:55.522584 systemd[1]: Stopping kubelet.service... Dec 13 14:22:55.550135 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:22:55.550333 systemd[1]: Stopped kubelet.service. Dec 13 14:22:55.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:55.552108 systemd[1]: Starting kubelet.service... Dec 13 14:22:55.632320 systemd[1]: Started kubelet.service. Dec 13 14:22:55.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:55.671633 kubelet[1940]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:22:55.671633 kubelet[1940]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:22:55.671633 kubelet[1940]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:22:55.672288 kubelet[1940]: I1213 14:22:55.671661 1940 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:22:55.678385 kubelet[1940]: I1213 14:22:55.678336 1940 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:22:55.678385 kubelet[1940]: I1213 14:22:55.678365 1940 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:22:55.678659 kubelet[1940]: I1213 14:22:55.678635 1940 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:22:55.679932 kubelet[1940]: I1213 14:22:55.679908 1940 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:22:55.682634 kubelet[1940]: I1213 14:22:55.682606 1940 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:22:55.686340 kubelet[1940]: E1213 14:22:55.686293 1940 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:22:55.686340 kubelet[1940]: I1213 14:22:55.686340 1940 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:22:55.690150 kubelet[1940]: I1213 14:22:55.690134 1940 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:22:55.690228 kubelet[1940]: I1213 14:22:55.690214 1940 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:22:55.690335 kubelet[1940]: I1213 14:22:55.690306 1940 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:22:55.690513 kubelet[1940]: I1213 14:22:55.690332 1940 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:22:55.690596 kubelet[1940]: I1213 14:22:55.690522 1940 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:22:55.690596 kubelet[1940]: I1213 14:22:55.690533 1940 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:22:55.690596 kubelet[1940]: I1213 14:22:55.690561 1940 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:22:55.690661 kubelet[1940]: I1213 14:22:55.690652 1940 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:22:55.690684 kubelet[1940]: I1213 14:22:55.690663 1940 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:22:55.690706 kubelet[1940]: I1213 14:22:55.690685 1940 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:22:55.690706 kubelet[1940]: I1213 14:22:55.690697 1940 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:22:55.693373 kubelet[1940]: I1213 14:22:55.692119 1940 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:22:55.693373 kubelet[1940]: I1213 14:22:55.692440 1940 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:22:55.693373 kubelet[1940]: I1213 14:22:55.692804 1940 server.go:1269] "Started kubelet" Dec 13 14:22:55.699491 kubelet[1940]: I1213 14:22:55.699431 1940 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:22:55.700028 kubelet[1940]: E1213 14:22:55.700005 1940 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:22:55.700000 audit[1940]: AVC avc: denied { mac_admin } for pid=1940 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.700000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:22:55.700000 audit[1940]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000be8990 a1=c000d82240 a2=c000be8960 a3=25 items=0 ppid=1 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:55.700000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:22:55.701504 kubelet[1940]: I1213 14:22:55.701473 1940 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:22:55.700000 audit[1940]: AVC avc: denied { mac_admin } for pid=1940 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.700000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:22:55.700000 audit[1940]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000501ee0 a1=c000d82258 a2=c000be8a20 a3=25 items=0 ppid=1 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:55.700000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:22:55.701989 kubelet[1940]: I1213 14:22:55.701598 1940 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:22:55.702079 kubelet[1940]: I1213 14:22:55.702065 1940 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:22:55.702181 kubelet[1940]: I1213 14:22:55.702168 1940 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:22:55.702868 kubelet[1940]: I1213 14:22:55.702856 1940 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:22:55.703095 kubelet[1940]: I1213 14:22:55.703083 1940 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:22:55.705168 kubelet[1940]: I1213 14:22:55.704986 1940 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:22:55.705168 kubelet[1940]: I1213 14:22:55.705126 1940 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:22:55.705356 kubelet[1940]: I1213 14:22:55.705312 1940 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:22:55.705634 kubelet[1940]: I1213 14:22:55.705599 1940 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:22:55.707419 kubelet[1940]: E1213 14:22:55.707386 1940 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:22:55.708087 kubelet[1940]: I1213 14:22:55.708072 1940 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:22:55.708249 kubelet[1940]: I1213 14:22:55.708230 1940 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:22:55.709543 kubelet[1940]: I1213 14:22:55.709511 1940 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:22:55.717830 kubelet[1940]: I1213 14:22:55.717288 1940 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:22:55.719551 kubelet[1940]: I1213 14:22:55.719526 1940 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:22:55.719611 kubelet[1940]: I1213 14:22:55.719565 1940 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:22:55.719611 kubelet[1940]: I1213 14:22:55.719589 1940 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:22:55.719705 kubelet[1940]: E1213 14:22:55.719639 1940 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:22:55.749669 kubelet[1940]: I1213 14:22:55.749641 1940 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:22:55.749669 kubelet[1940]: I1213 14:22:55.749657 1940 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:22:55.749669 kubelet[1940]: I1213 14:22:55.749674 1940 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:22:55.749865 kubelet[1940]: I1213 14:22:55.749815 1940 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:22:55.749865 kubelet[1940]: I1213 14:22:55.749829 1940 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:22:55.749865 kubelet[1940]: I1213 14:22:55.749860 1940 policy_none.go:49] "None policy: Start" Dec 13 14:22:55.750396 kubelet[1940]: I1213 14:22:55.750374 1940 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:22:55.750440 kubelet[1940]: I1213 14:22:55.750404 1940 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:22:55.750698 kubelet[1940]: I1213 14:22:55.750655 1940 state_mem.go:75] "Updated machine memory state" Dec 13 14:22:55.757671 kubelet[1940]: I1213 14:22:55.757637 1940 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:22:55.756000 audit[1940]: AVC avc: denied { mac_admin } for pid=1940 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:55.756000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:22:55.756000 audit[1940]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001106120 a1=c0012200a8 a2=c0011060f0 a3=25 items=0 ppid=1 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:55.756000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:22:55.758094 kubelet[1940]: I1213 14:22:55.757713 1940 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:22:55.758558 kubelet[1940]: I1213 14:22:55.758526 1940 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:22:55.758618 kubelet[1940]: I1213 14:22:55.758566 1940 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:22:55.758914 kubelet[1940]: I1213 14:22:55.758894 1940 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:22:55.861963 kubelet[1940]: I1213 14:22:55.861920 1940 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:22:55.906287 kubelet[1940]: I1213 14:22:55.904689 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5fa8bbf5dfdeb2654a746a7db2cc748f-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5fa8bbf5dfdeb2654a746a7db2cc748f\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:22:55.906287 kubelet[1940]: I1213 14:22:55.904737 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:55.906287 kubelet[1940]: I1213 14:22:55.904764 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:22:55.906287 kubelet[1940]: I1213 14:22:55.904784 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:55.906287 kubelet[1940]: I1213 14:22:55.904824 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5fa8bbf5dfdeb2654a746a7db2cc748f-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5fa8bbf5dfdeb2654a746a7db2cc748f\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:22:55.906548 kubelet[1940]: I1213 14:22:55.904868 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5fa8bbf5dfdeb2654a746a7db2cc748f-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5fa8bbf5dfdeb2654a746a7db2cc748f\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:22:55.906548 kubelet[1940]: I1213 14:22:55.904885 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:55.906548 kubelet[1940]: I1213 14:22:55.904916 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:55.906548 kubelet[1940]: I1213 14:22:55.904931 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:22:55.938107 kubelet[1940]: E1213 14:22:55.938066 1940 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Dec 13 14:22:55.938701 kubelet[1940]: I1213 14:22:55.938669 1940 kubelet_node_status.go:111] "Node was previously registered" node="localhost" Dec 13 14:22:55.938861 kubelet[1940]: I1213 14:22:55.938727 1940 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 14:22:56.207021 kubelet[1940]: E1213 14:22:56.206898 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:56.238110 kubelet[1940]: E1213 14:22:56.238048 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:56.238336 kubelet[1940]: E1213 14:22:56.238194 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:56.691818 kubelet[1940]: I1213 14:22:56.691727 1940 apiserver.go:52] "Watching apiserver" Dec 13 14:22:56.704143 kubelet[1940]: I1213 14:22:56.704104 1940 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:22:56.737053 kubelet[1940]: E1213 14:22:56.737018 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:56.737428 kubelet[1940]: E1213 14:22:56.737410 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:56.881670 kubelet[1940]: E1213 14:22:56.881629 1940 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 14:22:56.881859 kubelet[1940]: E1213 14:22:56.881821 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:57.015224 kubelet[1940]: I1213 14:22:57.015073 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.015053318 podStartE2EDuration="2.015053318s" podCreationTimestamp="2024-12-13 14:22:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:22:56.882320888 +0000 UTC m=+1.246317620" watchObservedRunningTime="2024-12-13 14:22:57.015053318 +0000 UTC m=+1.379050050" Dec 13 14:22:57.015224 kubelet[1940]: I1213 14:22:57.015184 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.015176832 podStartE2EDuration="2.015176832s" podCreationTimestamp="2024-12-13 14:22:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:22:57.015170489 +0000 UTC m=+1.379167221" watchObservedRunningTime="2024-12-13 14:22:57.015176832 +0000 UTC m=+1.379173554" Dec 13 14:22:57.208768 kubelet[1940]: I1213 14:22:57.208694 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.20865272 podStartE2EDuration="2.20865272s" podCreationTimestamp="2024-12-13 14:22:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:22:57.065175124 +0000 UTC m=+1.429171856" watchObservedRunningTime="2024-12-13 14:22:57.20865272 +0000 UTC m=+1.572649452" Dec 13 14:22:57.738378 kubelet[1940]: E1213 14:22:57.738337 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:57.738907 kubelet[1940]: E1213 14:22:57.738494 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:22:58.904000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:22:58.904000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd2b80 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:22:58.904000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:59.282000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:59.282000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000673500 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:22:59.282000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:59.282000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:59.282000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000673520 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:22:59.282000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:59.283000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:59.283000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006736c0 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:22:59.283000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:59.283000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:59.283000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b65c60 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:22:59.283000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:01.251703 kubelet[1940]: I1213 14:23:01.251641 1940 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:23:01.252158 env[1206]: time="2024-12-13T14:23:01.251987101Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:23:01.252385 kubelet[1940]: I1213 14:23:01.252177 1940 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:23:01.395544 kubelet[1940]: E1213 14:23:01.395507 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:01.743637 kubelet[1940]: E1213 14:23:01.743371 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:02.076411 update_engine[1198]: I1213 14:23:02.076284 1198 update_attempter.cc:509] Updating boot flags... Dec 13 14:23:02.304011 systemd[1]: Created slice kubepods-besteffort-pod200387dc_f8e2_4882_ac31_14c1f2a6e401.slice. Dec 13 14:23:02.476779 kubelet[1940]: I1213 14:23:02.476656 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/200387dc-f8e2-4882-ac31-14c1f2a6e401-kube-proxy\") pod \"kube-proxy-nqrmv\" (UID: \"200387dc-f8e2-4882-ac31-14c1f2a6e401\") " pod="kube-system/kube-proxy-nqrmv" Dec 13 14:23:02.476779 kubelet[1940]: I1213 14:23:02.476698 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/200387dc-f8e2-4882-ac31-14c1f2a6e401-lib-modules\") pod \"kube-proxy-nqrmv\" (UID: \"200387dc-f8e2-4882-ac31-14c1f2a6e401\") " pod="kube-system/kube-proxy-nqrmv" Dec 13 14:23:02.476779 kubelet[1940]: I1213 14:23:02.476715 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/200387dc-f8e2-4882-ac31-14c1f2a6e401-xtables-lock\") pod \"kube-proxy-nqrmv\" (UID: \"200387dc-f8e2-4882-ac31-14c1f2a6e401\") " pod="kube-system/kube-proxy-nqrmv" Dec 13 14:23:02.476779 kubelet[1940]: I1213 14:23:02.476730 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n7qdc\" (UniqueName: \"kubernetes.io/projected/200387dc-f8e2-4882-ac31-14c1f2a6e401-kube-api-access-n7qdc\") pod \"kube-proxy-nqrmv\" (UID: \"200387dc-f8e2-4882-ac31-14c1f2a6e401\") " pod="kube-system/kube-proxy-nqrmv" Dec 13 14:23:02.586691 kubelet[1940]: I1213 14:23:02.586661 1940 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:23:02.602055 systemd[1]: Created slice kubepods-besteffort-pod76e13e31_66cc_406c_b8fa_df59d65e1bb3.slice. Dec 13 14:23:02.602316 sudo[1343]: pam_unix(sudo:session): session closed for user root Dec 13 14:23:02.605880 kernel: kauditd_printk_skb: 277 callbacks suppressed Dec 13 14:23:02.605997 kernel: audit: type=1106 audit(1734099782.600:793): pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:02.600000 audit[1343]: USER_END pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:02.604608 sshd[1340]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:02.600000 audit[1343]: CRED_DISP pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:02.612275 kernel: audit: type=1104 audit(1734099782.600:794): pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:02.617733 kernel: audit: type=1106 audit(1734099782.608:795): pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:02.608000 audit[1340]: USER_END pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:02.612597 systemd-logind[1197]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:23:02.612997 systemd[1]: sshd@6-10.0.0.66:22-10.0.0.1:37200.service: Deactivated successfully. Dec 13 14:23:02.613659 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:23:02.613779 systemd[1]: session-7.scope: Consumed 4.485s CPU time. Dec 13 14:23:02.614354 systemd-logind[1197]: Removed session 7. Dec 13 14:23:02.609000 audit[1340]: CRED_DISP pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:02.619047 kubelet[1940]: E1213 14:23:02.619009 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:02.619771 env[1206]: time="2024-12-13T14:23:02.619727020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nqrmv,Uid:200387dc-f8e2-4882-ac31-14c1f2a6e401,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:02.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.66:22-10.0.0.1:37200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:02.626314 kernel: audit: type=1104 audit(1734099782.609:796): pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:02.626388 kernel: audit: type=1131 audit(1734099782.611:797): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.66:22-10.0.0.1:37200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:02.649783 env[1206]: time="2024-12-13T14:23:02.649702780Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:02.649783 env[1206]: time="2024-12-13T14:23:02.649750983Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:02.649783 env[1206]: time="2024-12-13T14:23:02.649766013Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:02.650055 env[1206]: time="2024-12-13T14:23:02.650002303Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4cb0fd7b69d9eb34644fb286a49d450b1ca4d69228bc3fa0de69748f5ac624e0 pid=2049 runtime=io.containerd.runc.v2 Dec 13 14:23:02.664326 systemd[1]: Started cri-containerd-4cb0fd7b69d9eb34644fb286a49d450b1ca4d69228bc3fa0de69748f5ac624e0.scope. Dec 13 14:23:02.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679887 kernel: audit: type=1400 audit(1734099782.671:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.680043 kernel: audit: type=1400 audit(1734099782.671:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.680074 kernel: audit: type=1400 audit(1734099782.671:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.686357 kernel: audit: type=1400 audit(1734099782.671:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.689875 kernel: audit: type=1400 audit(1734099782.671:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.678000 audit: BPF prog-id=100 op=LOAD Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463623066643762363964396562333436343466623238366134396434 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463623066643762363964396562333436343466623238366134396434 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.679000 audit: BPF prog-id=101 op=LOAD Dec 13 14:23:02.679000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099370 items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463623066643762363964396562333436343466623238366134396434 Dec 13 14:23:02.681000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.681000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.681000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.681000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.681000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.681000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.681000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.681000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.681000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.681000 audit: BPF prog-id=102 op=LOAD Dec 13 14:23:02.681000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000993b8 items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463623066643762363964396562333436343466623238366134396434 Dec 13 14:23:02.684000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:23:02.684000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.684000 audit: BPF prog-id=103 op=LOAD Dec 13 14:23:02.684000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000997c8 items=0 ppid=2049 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463623066643762363964396562333436343466623238366134396434 Dec 13 14:23:02.700768 env[1206]: time="2024-12-13T14:23:02.700704610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nqrmv,Uid:200387dc-f8e2-4882-ac31-14c1f2a6e401,Namespace:kube-system,Attempt:0,} returns sandbox id \"4cb0fd7b69d9eb34644fb286a49d450b1ca4d69228bc3fa0de69748f5ac624e0\"" Dec 13 14:23:02.701649 kubelet[1940]: E1213 14:23:02.701612 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:02.704122 env[1206]: time="2024-12-13T14:23:02.704073401Z" level=info msg="CreateContainer within sandbox \"4cb0fd7b69d9eb34644fb286a49d450b1ca4d69228bc3fa0de69748f5ac624e0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:23:02.732648 env[1206]: time="2024-12-13T14:23:02.732434858Z" level=info msg="CreateContainer within sandbox \"4cb0fd7b69d9eb34644fb286a49d450b1ca4d69228bc3fa0de69748f5ac624e0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e82979be9a9f03d3f193f548ee53310f3028ef20e35ee328d82f43b90cdf1f3d\"" Dec 13 14:23:02.735403 env[1206]: time="2024-12-13T14:23:02.735335046Z" level=info msg="StartContainer for \"e82979be9a9f03d3f193f548ee53310f3028ef20e35ee328d82f43b90cdf1f3d\"" Dec 13 14:23:02.751668 systemd[1]: Started cri-containerd-e82979be9a9f03d3f193f548ee53310f3028ef20e35ee328d82f43b90cdf1f3d.scope. Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efd303e0b58 items=0 ppid=2049 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538323937396265396139663033643366313933663534386565353333 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit: BPF prog-id=104 op=LOAD Dec 13 14:23:02.763000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002cbba8 items=0 ppid=2049 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538323937396265396139663033643366313933663534386565353333 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit: BPF prog-id=105 op=LOAD Dec 13 14:23:02.763000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002cbbf8 items=0 ppid=2049 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538323937396265396139663033643366313933663534386565353333 Dec 13 14:23:02.763000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:23:02.763000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:02.763000 audit: BPF prog-id=106 op=LOAD Dec 13 14:23:02.763000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002cbc88 items=0 ppid=2049 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538323937396265396139663033643366313933663534386565353333 Dec 13 14:23:02.778111 kubelet[1940]: I1213 14:23:02.778050 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/76e13e31-66cc-406c-b8fa-df59d65e1bb3-var-lib-calico\") pod \"tigera-operator-76c4976dd7-7sf8s\" (UID: \"76e13e31-66cc-406c-b8fa-df59d65e1bb3\") " pod="tigera-operator/tigera-operator-76c4976dd7-7sf8s" Dec 13 14:23:02.778248 kubelet[1940]: I1213 14:23:02.778127 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jccst\" (UniqueName: \"kubernetes.io/projected/76e13e31-66cc-406c-b8fa-df59d65e1bb3-kube-api-access-jccst\") pod \"tigera-operator-76c4976dd7-7sf8s\" (UID: \"76e13e31-66cc-406c-b8fa-df59d65e1bb3\") " pod="tigera-operator/tigera-operator-76c4976dd7-7sf8s" Dec 13 14:23:02.873535 env[1206]: time="2024-12-13T14:23:02.873474474Z" level=info msg="StartContainer for \"e82979be9a9f03d3f193f548ee53310f3028ef20e35ee328d82f43b90cdf1f3d\" returns successfully" Dec 13 14:23:02.912223 env[1206]: time="2024-12-13T14:23:02.912175698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-7sf8s,Uid:76e13e31-66cc-406c-b8fa-df59d65e1bb3,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:23:02.913000 audit[2150]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:02.913000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcbd91630 a2=0 a3=7ffdcbd9161c items=0 ppid=2100 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:23:02.914000 audit[2151]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:02.914000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeff989070 a2=0 a3=5ace93fc52297db items=0 ppid=2100 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.914000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:23:02.914000 audit[2152]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:02.914000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbda48620 a2=0 a3=7ffcbda4860c items=0 ppid=2100 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:23:02.915000 audit[2153]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:02.915000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfe8260c0 a2=0 a3=7ffcfe8260ac items=0 ppid=2100 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:23:02.916000 audit[2155]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:02.916000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc162e40e0 a2=0 a3=7ffc162e40cc items=0 ppid=2100 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.916000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:23:02.919000 audit[2156]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:02.919000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd47eff7e0 a2=0 a3=7ffd47eff7cc items=0 ppid=2100 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:23:03.018000 audit[2157]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.018000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc09770550 a2=0 a3=7ffc0977053c items=0 ppid=2100 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:23:03.020000 audit[2159]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.020000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffffd759b10 a2=0 a3=7ffffd759afc items=0 ppid=2100 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:23:03.024000 audit[2162]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.024000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffbab7c110 a2=0 a3=7fffbab7c0fc items=0 ppid=2100 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:23:03.025000 audit[2163]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.025000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdae97ed0 a2=0 a3=7ffcdae97ebc items=0 ppid=2100 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:23:03.026000 audit[2165]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.026000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe004525a0 a2=0 a3=7ffe0045258c items=0 ppid=2100 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:23:03.027000 audit[2166]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.027000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2e029150 a2=0 a3=7fff2e02913c items=0 ppid=2100 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:23:03.029000 audit[2168]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.029000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc21d8fcd0 a2=0 a3=7ffc21d8fcbc items=0 ppid=2100 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:23:03.032000 audit[2171]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.032000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff337bac50 a2=0 a3=7fff337bac3c items=0 ppid=2100 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:23:03.033000 audit[2172]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.033000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0dc31fa0 a2=0 a3=7ffe0dc31f8c items=0 ppid=2100 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:23:03.035000 audit[2174]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.035000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc9cf5d50 a2=0 a3=7ffcc9cf5d3c items=0 ppid=2100 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:23:03.036000 audit[2175]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.036000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea8aacbc0 a2=0 a3=7ffea8aacbac items=0 ppid=2100 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:23:03.038000 audit[2177]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.038000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd8c48fb0 a2=0 a3=7ffdd8c48f9c items=0 ppid=2100 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:23:03.041000 audit[2180]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.041000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc68900ab0 a2=0 a3=7ffc68900a9c items=0 ppid=2100 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:23:03.044000 audit[2183]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.044000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc676f4f20 a2=0 a3=7ffc676f4f0c items=0 ppid=2100 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:23:03.045000 audit[2184]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.045000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe20c84490 a2=0 a3=7ffe20c8447c items=0 ppid=2100 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:23:03.047000 audit[2186]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.047000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc165514d0 a2=0 a3=7ffc165514bc items=0 ppid=2100 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:03.051000 audit[2189]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.051000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3eb71dc0 a2=0 a3=7ffd3eb71dac items=0 ppid=2100 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:03.052000 audit[2190]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.052000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3ce7f4c0 a2=0 a3=7fff3ce7f4ac items=0 ppid=2100 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.052000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:23:03.054000 audit[2192]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:03.054000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd8f1545e0 a2=0 a3=7ffd8f1545cc items=0 ppid=2100 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:23:03.077876 env[1206]: time="2024-12-13T14:23:03.077768338Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:03.078054 env[1206]: time="2024-12-13T14:23:03.077833846Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:03.078054 env[1206]: time="2024-12-13T14:23:03.077885727Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:03.075000 audit[2198]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:03.075000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc5ada3920 a2=0 a3=7ffc5ada390c items=0 ppid=2100 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:03.078293 env[1206]: time="2024-12-13T14:23:03.078206801Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f4113b883f1c0c9a42d75f1b9ae806a8aa6c101cd5cd58de341819689569ff71 pid=2209 runtime=io.containerd.runc.v2 Dec 13 14:23:03.086000 audit[2198]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:03.086000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc5ada3920 a2=0 a3=7ffc5ada390c items=0 ppid=2100 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.086000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:03.087000 audit[2230]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.087000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdfba8c510 a2=0 a3=7ffdfba8c4fc items=0 ppid=2100 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:23:03.091461 systemd[1]: Started cri-containerd-f4113b883f1c0c9a42d75f1b9ae806a8aa6c101cd5cd58de341819689569ff71.scope. Dec 13 14:23:03.089000 audit[2232]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.089000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcace62670 a2=0 a3=7ffcace6265c items=0 ppid=2100 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:23:03.098000 audit[2235]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.098000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda7a0fc10 a2=0 a3=7ffda7a0fbfc items=0 ppid=2100 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:23:03.101000 audit[2243]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.101000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed173aa90 a2=0 a3=7ffed173aa7c items=0 ppid=2100 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:23:03.104000 audit[2245]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.104000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc63a87070 a2=0 a3=7ffc63a8705c items=0 ppid=2100 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:23:03.105000 audit[2246]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.105000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca82fddd0 a2=0 a3=7ffca82fddbc items=0 ppid=2100 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:23:03.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.106000 audit: BPF prog-id=107 op=LOAD Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313133623838336631633063396134326437356631623961653830 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313133623838336631633063396134326437356631623961653830 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit: BPF prog-id=108 op=LOAD Dec 13 14:23:03.107000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e5a20 items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313133623838336631633063396134326437356631623961653830 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit: BPF prog-id=109 op=LOAD Dec 13 14:23:03.107000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e5a68 items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313133623838336631633063396134326437356631623961653830 Dec 13 14:23:03.107000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:23:03.107000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:03.107000 audit: BPF prog-id=110 op=LOAD Dec 13 14:23:03.107000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e5e78 items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634313133623838336631633063396134326437356631623961653830 Dec 13 14:23:03.108000 audit[2248]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.108000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc9787dfd0 a2=0 a3=7ffc9787dfbc items=0 ppid=2100 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:23:03.111000 audit[2251]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.111000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd36b6e900 a2=0 a3=7ffd36b6e8ec items=0 ppid=2100 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:23:03.112000 audit[2252]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.112000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6eb8fe80 a2=0 a3=7fff6eb8fe6c items=0 ppid=2100 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:23:03.114000 audit[2254]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.114000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc462c8200 a2=0 a3=7ffc462c81ec items=0 ppid=2100 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:23:03.114000 audit[2255]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.114000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecf954240 a2=0 a3=7ffecf95422c items=0 ppid=2100 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:23:03.116000 audit[2257]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.116000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff02d0ce50 a2=0 a3=7fff02d0ce3c items=0 ppid=2100 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:23:03.120000 audit[2260]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.120000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff918bccc0 a2=0 a3=7fff918bccac items=0 ppid=2100 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:23:03.122000 audit[2263]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.122000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6c687920 a2=0 a3=7ffe6c68790c items=0 ppid=2100 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:23:03.123000 audit[2264]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.123000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc60143700 a2=0 a3=7ffc601436ec items=0 ppid=2100 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:23:03.127000 audit[2266]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.127000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe07095310 a2=0 a3=7ffe070952fc items=0 ppid=2100 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:03.133000 audit[2276]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.133000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff783c52d0 a2=0 a3=7fff783c52bc items=0 ppid=2100 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:03.136384 env[1206]: time="2024-12-13T14:23:03.136351108Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-7sf8s,Uid:76e13e31-66cc-406c-b8fa-df59d65e1bb3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f4113b883f1c0c9a42d75f1b9ae806a8aa6c101cd5cd58de341819689569ff71\"" Dec 13 14:23:03.134000 audit[2277]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.134000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6c81fcc0 a2=0 a3=7ffe6c81fcac items=0 ppid=2100 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.134000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:23:03.138185 env[1206]: time="2024-12-13T14:23:03.138162720Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:23:03.136000 audit[2279]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.136000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff51040b50 a2=0 a3=7fff51040b3c items=0 ppid=2100 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:23:03.137000 audit[2280]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.137000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd816e8ad0 a2=0 a3=7ffd816e8abc items=0 ppid=2100 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:23:03.139000 audit[2282]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.139000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe0b940b50 a2=0 a3=7ffe0b940b3c items=0 ppid=2100 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:03.142000 audit[2285]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:03.142000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc2014bf80 a2=0 a3=7ffc2014bf6c items=0 ppid=2100 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:03.144000 audit[2287]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:23:03.144000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc9afa0020 a2=0 a3=7ffc9afa000c items=0 ppid=2100 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.144000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:03.145000 audit[2287]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:23:03.145000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc9afa0020 a2=0 a3=7ffc9afa000c items=0 ppid=2100 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.145000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:03.593150 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount178610450.mount: Deactivated successfully. Dec 13 14:23:03.748351 kubelet[1940]: E1213 14:23:03.748304 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:03.758827 kubelet[1940]: I1213 14:23:03.758043 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-nqrmv" podStartSLOduration=1.758024785 podStartE2EDuration="1.758024785s" podCreationTimestamp="2024-12-13 14:23:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:03.757826128 +0000 UTC m=+8.121822860" watchObservedRunningTime="2024-12-13 14:23:03.758024785 +0000 UTC m=+8.122021507" Dec 13 14:23:04.751290 kubelet[1940]: E1213 14:23:04.751253 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:05.536444 kubelet[1940]: E1213 14:23:05.536403 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:05.567081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3627656019.mount: Deactivated successfully. Dec 13 14:23:05.752728 kubelet[1940]: E1213 14:23:05.752688 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:06.865194 env[1206]: time="2024-12-13T14:23:06.865145400Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:06.867254 env[1206]: time="2024-12-13T14:23:06.867229272Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:06.868672 env[1206]: time="2024-12-13T14:23:06.868634861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:06.870182 env[1206]: time="2024-12-13T14:23:06.870131377Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:06.870665 env[1206]: time="2024-12-13T14:23:06.870625783Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:23:06.872750 env[1206]: time="2024-12-13T14:23:06.872696750Z" level=info msg="CreateContainer within sandbox \"f4113b883f1c0c9a42d75f1b9ae806a8aa6c101cd5cd58de341819689569ff71\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:23:06.886548 env[1206]: time="2024-12-13T14:23:06.886491200Z" level=info msg="CreateContainer within sandbox \"f4113b883f1c0c9a42d75f1b9ae806a8aa6c101cd5cd58de341819689569ff71\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"37087772c8f79a5af904a7de91782adb03554af6c687b055803c0a219d5505d1\"" Dec 13 14:23:06.887027 env[1206]: time="2024-12-13T14:23:06.887000285Z" level=info msg="StartContainer for \"37087772c8f79a5af904a7de91782adb03554af6c687b055803c0a219d5505d1\"" Dec 13 14:23:06.909962 systemd[1]: Started cri-containerd-37087772c8f79a5af904a7de91782adb03554af6c687b055803c0a219d5505d1.scope. Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.919000 audit: BPF prog-id=111 op=LOAD Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2209 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303837373732633866373961356166393034613764653931373832 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2209 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303837373732633866373961356166393034613764653931373832 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit: BPF prog-id=112 op=LOAD Dec 13 14:23:06.920000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025d70 items=0 ppid=2209 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303837373732633866373961356166393034613764653931373832 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit: BPF prog-id=113 op=LOAD Dec 13 14:23:06.920000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025db8 items=0 ppid=2209 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303837373732633866373961356166393034613764653931373832 Dec 13 14:23:06.920000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:23:06.920000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:06.920000 audit: BPF prog-id=114 op=LOAD Dec 13 14:23:06.920000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002f61c8 items=0 ppid=2209 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303837373732633866373961356166393034613764653931373832 Dec 13 14:23:06.940678 env[1206]: time="2024-12-13T14:23:06.940630310Z" level=info msg="StartContainer for \"37087772c8f79a5af904a7de91782adb03554af6c687b055803c0a219d5505d1\" returns successfully" Dec 13 14:23:07.586222 kubelet[1940]: E1213 14:23:07.586175 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:07.797060 kubelet[1940]: I1213 14:23:07.796894 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-7sf8s" podStartSLOduration=2.062874735 podStartE2EDuration="5.796875088s" podCreationTimestamp="2024-12-13 14:23:02 +0000 UTC" firstStartedPulling="2024-12-13 14:23:03.137626878 +0000 UTC m=+7.501623610" lastFinishedPulling="2024-12-13 14:23:06.871627231 +0000 UTC m=+11.235623963" observedRunningTime="2024-12-13 14:23:07.796805764 +0000 UTC m=+12.160802496" watchObservedRunningTime="2024-12-13 14:23:07.796875088 +0000 UTC m=+12.160871820" Dec 13 14:23:09.838338 kernel: kauditd_printk_skb: 362 callbacks suppressed Dec 13 14:23:09.838505 kernel: audit: type=1325 audit(1734099789.832:909): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:09.832000 audit[2330]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:09.832000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffa0f8c630 a2=0 a3=7fffa0f8c61c items=0 ppid=2100 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:09.839081 kernel: audit: type=1300 audit(1734099789.832:909): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffa0f8c630 a2=0 a3=7fffa0f8c61c items=0 ppid=2100 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:09.832000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:09.846519 kernel: audit: type=1327 audit(1734099789.832:909): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:09.847000 audit[2330]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:09.847000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa0f8c630 a2=0 a3=0 items=0 ppid=2100 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:09.856953 kernel: audit: type=1325 audit(1734099789.847:910): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:09.856995 kernel: audit: type=1300 audit(1734099789.847:910): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa0f8c630 a2=0 a3=0 items=0 ppid=2100 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:09.857052 kernel: audit: type=1327 audit(1734099789.847:910): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:09.847000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:09.864000 audit[2332]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:09.864000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe8b6edea0 a2=0 a3=7ffe8b6ede8c items=0 ppid=2100 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:09.874007 kernel: audit: type=1325 audit(1734099789.864:911): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:09.874065 kernel: audit: type=1300 audit(1734099789.864:911): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe8b6edea0 a2=0 a3=7ffe8b6ede8c items=0 ppid=2100 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:09.874091 kernel: audit: type=1327 audit(1734099789.864:911): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:09.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:09.879000 audit[2332]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:09.879000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe8b6edea0 a2=0 a3=0 items=0 ppid=2100 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:09.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:09.883867 kernel: audit: type=1325 audit(1734099789.879:912): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:10.028087 systemd[1]: Created slice kubepods-besteffort-pod4067d398_7e94_4890_9abf_7e4f2f4f769f.slice. Dec 13 14:23:10.035953 systemd[1]: Created slice kubepods-besteffort-pod89c05fae_86aa_4f44_a9e3_0f620bb5fe05.slice. Dec 13 14:23:10.120763 kubelet[1940]: E1213 14:23:10.120708 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:10.132701 kubelet[1940]: I1213 14:23:10.132658 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4067d398-7e94-4890-9abf-7e4f2f4f769f-node-certs\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.132701 kubelet[1940]: I1213 14:23:10.132698 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4067d398-7e94-4890-9abf-7e4f2f4f769f-cni-log-dir\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.132701 kubelet[1940]: I1213 14:23:10.132711 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/89c05fae-86aa-4f44-a9e3-0f620bb5fe05-typha-certs\") pod \"calico-typha-77cc4f4569-lckvf\" (UID: \"89c05fae-86aa-4f44-a9e3-0f620bb5fe05\") " pod="calico-system/calico-typha-77cc4f4569-lckvf" Dec 13 14:23:10.133101 kubelet[1940]: I1213 14:23:10.132725 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4067d398-7e94-4890-9abf-7e4f2f4f769f-var-run-calico\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133101 kubelet[1940]: I1213 14:23:10.132742 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4067d398-7e94-4890-9abf-7e4f2f4f769f-var-lib-calico\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133101 kubelet[1940]: I1213 14:23:10.132763 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cvwp6\" (UniqueName: \"kubernetes.io/projected/89c05fae-86aa-4f44-a9e3-0f620bb5fe05-kube-api-access-cvwp6\") pod \"calico-typha-77cc4f4569-lckvf\" (UID: \"89c05fae-86aa-4f44-a9e3-0f620bb5fe05\") " pod="calico-system/calico-typha-77cc4f4569-lckvf" Dec 13 14:23:10.133101 kubelet[1940]: I1213 14:23:10.132789 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2-registration-dir\") pod \"csi-node-driver-g6jxc\" (UID: \"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2\") " pod="calico-system/csi-node-driver-g6jxc" Dec 13 14:23:10.133101 kubelet[1940]: I1213 14:23:10.132803 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4067d398-7e94-4890-9abf-7e4f2f4f769f-xtables-lock\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133276 kubelet[1940]: I1213 14:23:10.132816 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4067d398-7e94-4890-9abf-7e4f2f4f769f-policysync\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133276 kubelet[1940]: I1213 14:23:10.132828 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4067d398-7e94-4890-9abf-7e4f2f4f769f-lib-modules\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133276 kubelet[1940]: I1213 14:23:10.132854 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2-varrun\") pod \"csi-node-driver-g6jxc\" (UID: \"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2\") " pod="calico-system/csi-node-driver-g6jxc" Dec 13 14:23:10.133276 kubelet[1940]: I1213 14:23:10.132899 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2-socket-dir\") pod \"csi-node-driver-g6jxc\" (UID: \"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2\") " pod="calico-system/csi-node-driver-g6jxc" Dec 13 14:23:10.133276 kubelet[1940]: I1213 14:23:10.132919 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4067d398-7e94-4890-9abf-7e4f2f4f769f-cni-net-dir\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133405 kubelet[1940]: I1213 14:23:10.132932 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4067d398-7e94-4890-9abf-7e4f2f4f769f-flexvol-driver-host\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133405 kubelet[1940]: I1213 14:23:10.132949 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/89c05fae-86aa-4f44-a9e3-0f620bb5fe05-tigera-ca-bundle\") pod \"calico-typha-77cc4f4569-lckvf\" (UID: \"89c05fae-86aa-4f44-a9e3-0f620bb5fe05\") " pod="calico-system/calico-typha-77cc4f4569-lckvf" Dec 13 14:23:10.133405 kubelet[1940]: I1213 14:23:10.132962 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2-kubelet-dir\") pod \"csi-node-driver-g6jxc\" (UID: \"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2\") " pod="calico-system/csi-node-driver-g6jxc" Dec 13 14:23:10.133405 kubelet[1940]: I1213 14:23:10.132978 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4067d398-7e94-4890-9abf-7e4f2f4f769f-tigera-ca-bundle\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133405 kubelet[1940]: I1213 14:23:10.132992 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4067d398-7e94-4890-9abf-7e4f2f4f769f-cni-bin-dir\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133541 kubelet[1940]: I1213 14:23:10.133005 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vbbbq\" (UniqueName: \"kubernetes.io/projected/4067d398-7e94-4890-9abf-7e4f2f4f769f-kube-api-access-vbbbq\") pod \"calico-node-s9pd8\" (UID: \"4067d398-7e94-4890-9abf-7e4f2f4f769f\") " pod="calico-system/calico-node-s9pd8" Dec 13 14:23:10.133541 kubelet[1940]: I1213 14:23:10.133020 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4sjfd\" (UniqueName: \"kubernetes.io/projected/35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2-kube-api-access-4sjfd\") pod \"csi-node-driver-g6jxc\" (UID: \"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2\") " pod="calico-system/csi-node-driver-g6jxc" Dec 13 14:23:10.234328 kubelet[1940]: E1213 14:23:10.234288 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.234328 kubelet[1940]: W1213 14:23:10.234321 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.234541 kubelet[1940]: E1213 14:23:10.234360 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.234687 kubelet[1940]: E1213 14:23:10.234651 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.234687 kubelet[1940]: W1213 14:23:10.234665 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.234785 kubelet[1940]: E1213 14:23:10.234693 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.235561 kubelet[1940]: E1213 14:23:10.235541 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.235561 kubelet[1940]: W1213 14:23:10.235557 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.235674 kubelet[1940]: E1213 14:23:10.235579 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.235868 kubelet[1940]: E1213 14:23:10.235834 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.235932 kubelet[1940]: W1213 14:23:10.235886 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.235932 kubelet[1940]: E1213 14:23:10.235902 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.236089 kubelet[1940]: E1213 14:23:10.236070 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.236089 kubelet[1940]: W1213 14:23:10.236084 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.236187 kubelet[1940]: E1213 14:23:10.236100 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.236721 kubelet[1940]: E1213 14:23:10.236689 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.236794 kubelet[1940]: W1213 14:23:10.236722 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.236794 kubelet[1940]: E1213 14:23:10.236742 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.236962 kubelet[1940]: E1213 14:23:10.236941 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.236962 kubelet[1940]: W1213 14:23:10.236959 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.237080 kubelet[1940]: E1213 14:23:10.237036 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.237168 kubelet[1940]: E1213 14:23:10.237151 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.237168 kubelet[1940]: W1213 14:23:10.237165 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.237281 kubelet[1940]: E1213 14:23:10.237247 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.237377 kubelet[1940]: E1213 14:23:10.237360 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.237377 kubelet[1940]: W1213 14:23:10.237374 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.237493 kubelet[1940]: E1213 14:23:10.237453 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.237589 kubelet[1940]: E1213 14:23:10.237572 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.237589 kubelet[1940]: W1213 14:23:10.237585 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.237677 kubelet[1940]: E1213 14:23:10.237662 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.237807 kubelet[1940]: E1213 14:23:10.237791 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.237887 kubelet[1940]: W1213 14:23:10.237807 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.237887 kubelet[1940]: E1213 14:23:10.237833 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.238069 kubelet[1940]: E1213 14:23:10.238052 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.238069 kubelet[1940]: W1213 14:23:10.238067 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.238174 kubelet[1940]: E1213 14:23:10.238083 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.238342 kubelet[1940]: E1213 14:23:10.238328 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.238419 kubelet[1940]: W1213 14:23:10.238344 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.238419 kubelet[1940]: E1213 14:23:10.238356 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.238652 kubelet[1940]: E1213 14:23:10.238639 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.238705 kubelet[1940]: W1213 14:23:10.238653 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.238705 kubelet[1940]: E1213 14:23:10.238674 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.238859 kubelet[1940]: E1213 14:23:10.238829 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.238859 kubelet[1940]: W1213 14:23:10.238840 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.238955 kubelet[1940]: E1213 14:23:10.238877 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.239083 kubelet[1940]: E1213 14:23:10.239068 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.239142 kubelet[1940]: W1213 14:23:10.239084 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.239179 kubelet[1940]: E1213 14:23:10.239160 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.239307 kubelet[1940]: E1213 14:23:10.239293 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.239365 kubelet[1940]: W1213 14:23:10.239307 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.239437 kubelet[1940]: E1213 14:23:10.239416 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.243418 kubelet[1940]: E1213 14:23:10.243402 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.243546 kubelet[1940]: W1213 14:23:10.243524 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.243723 kubelet[1940]: E1213 14:23:10.243708 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.243812 kubelet[1940]: W1213 14:23:10.243793 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.244077 kubelet[1940]: E1213 14:23:10.244064 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.244166 kubelet[1940]: W1213 14:23:10.244148 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.244276 kubelet[1940]: E1213 14:23:10.244257 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.244553 kubelet[1940]: E1213 14:23:10.244539 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.244635 kubelet[1940]: W1213 14:23:10.244618 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.244725 kubelet[1940]: E1213 14:23:10.244708 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.244831 kubelet[1940]: E1213 14:23:10.244814 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.245058 kubelet[1940]: E1213 14:23:10.245046 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.245141 kubelet[1940]: W1213 14:23:10.245123 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.245247 kubelet[1940]: E1213 14:23:10.245229 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.245341 kubelet[1940]: E1213 14:23:10.245316 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.245565 kubelet[1940]: E1213 14:23:10.245553 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.245654 kubelet[1940]: W1213 14:23:10.245637 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.245745 kubelet[1940]: E1213 14:23:10.245727 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.246142 kubelet[1940]: E1213 14:23:10.246129 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.246252 kubelet[1940]: W1213 14:23:10.246234 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.246346 kubelet[1940]: E1213 14:23:10.246329 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.248780 kubelet[1940]: E1213 14:23:10.248734 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.248780 kubelet[1940]: W1213 14:23:10.248753 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.248780 kubelet[1940]: E1213 14:23:10.248766 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.256884 kubelet[1940]: E1213 14:23:10.250448 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.256884 kubelet[1940]: W1213 14:23:10.250461 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.256884 kubelet[1940]: E1213 14:23:10.250472 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.256884 kubelet[1940]: E1213 14:23:10.253593 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:10.256884 kubelet[1940]: W1213 14:23:10.253602 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:10.256884 kubelet[1940]: E1213 14:23:10.253612 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:10.333973 kubelet[1940]: E1213 14:23:10.333934 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:10.334505 env[1206]: time="2024-12-13T14:23:10.334469552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s9pd8,Uid:4067d398-7e94-4890-9abf-7e4f2f4f769f,Namespace:calico-system,Attempt:0,}" Dec 13 14:23:10.338768 kubelet[1940]: E1213 14:23:10.338733 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:10.339125 env[1206]: time="2024-12-13T14:23:10.339094594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-77cc4f4569-lckvf,Uid:89c05fae-86aa-4f44-a9e3-0f620bb5fe05,Namespace:calico-system,Attempt:0,}" Dec 13 14:23:10.543531 env[1206]: time="2024-12-13T14:23:10.536585032Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:10.543531 env[1206]: time="2024-12-13T14:23:10.536634277Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:10.543531 env[1206]: time="2024-12-13T14:23:10.536655768Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:10.543531 env[1206]: time="2024-12-13T14:23:10.536853228Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/736eb031c1415b0494998945212c7a0066517bcf01b8e492ab0cc72a8745e28c pid=2371 runtime=io.containerd.runc.v2 Dec 13 14:23:10.547549 env[1206]: time="2024-12-13T14:23:10.547293936Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:10.547549 env[1206]: time="2024-12-13T14:23:10.547342691Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:10.547549 env[1206]: time="2024-12-13T14:23:10.547355976Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:10.547549 env[1206]: time="2024-12-13T14:23:10.547480035Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbe77cd68f8967f6bb6ccab6e4b6e3d6d7492804374b2ddecbf97b2d9ea6c29a pid=2385 runtime=io.containerd.runc.v2 Dec 13 14:23:10.552290 systemd[1]: Started cri-containerd-736eb031c1415b0494998945212c7a0066517bcf01b8e492ab0cc72a8745e28c.scope. Dec 13 14:23:10.564984 systemd[1]: Started cri-containerd-cbe77cd68f8967f6bb6ccab6e4b6e3d6d7492804374b2ddecbf97b2d9ea6c29a.scope. Dec 13 14:23:10.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.569000 audit: BPF prog-id=115 op=LOAD Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733366562303331633134313562303439343939383934353231326337 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733366562303331633134313562303439343939383934353231326337 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit: BPF prog-id=116 op=LOAD Dec 13 14:23:10.570000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025880 items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733366562303331633134313562303439343939383934353231326337 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit: BPF prog-id=117 op=LOAD Dec 13 14:23:10.570000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000258c8 items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733366562303331633134313562303439343939383934353231326337 Dec 13 14:23:10.570000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:23:10.570000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.570000 audit: BPF prog-id=118 op=LOAD Dec 13 14:23:10.570000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025cd8 items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733366562303331633134313562303439343939383934353231326337 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.582000 audit: BPF prog-id=119 op=LOAD Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2385 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653737636436386638393637663662623663636162366534623665 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2385 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653737636436386638393637663662623663636162366534623665 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit: BPF prog-id=120 op=LOAD Dec 13 14:23:10.583000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000312ac0 items=0 ppid=2385 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653737636436386638393637663662623663636162366534623665 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit: BPF prog-id=121 op=LOAD Dec 13 14:23:10.583000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000312b08 items=0 ppid=2385 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653737636436386638393637663662623663636162366534623665 Dec 13 14:23:10.583000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:23:10.583000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.583000 audit: BPF prog-id=122 op=LOAD Dec 13 14:23:10.583000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000312f18 items=0 ppid=2385 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653737636436386638393637663662623663636162366534623665 Dec 13 14:23:10.591489 env[1206]: time="2024-12-13T14:23:10.591385633Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s9pd8,Uid:4067d398-7e94-4890-9abf-7e4f2f4f769f,Namespace:calico-system,Attempt:0,} returns sandbox id \"736eb031c1415b0494998945212c7a0066517bcf01b8e492ab0cc72a8745e28c\"" Dec 13 14:23:10.592100 kubelet[1940]: E1213 14:23:10.592077 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:10.593030 env[1206]: time="2024-12-13T14:23:10.592995011Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:23:10.611039 env[1206]: time="2024-12-13T14:23:10.610980773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-77cc4f4569-lckvf,Uid:89c05fae-86aa-4f44-a9e3-0f620bb5fe05,Namespace:calico-system,Attempt:0,} returns sandbox id \"cbe77cd68f8967f6bb6ccab6e4b6e3d6d7492804374b2ddecbf97b2d9ea6c29a\"" Dec 13 14:23:10.611784 kubelet[1940]: E1213 14:23:10.611757 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:10.911000 audit[2447]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:10.911000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffd31c3680 a2=0 a3=7fffd31c366c items=0 ppid=2100 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.911000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:10.916000 audit[2447]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:10.916000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffd31c3680 a2=0 a3=0 items=0 ppid=2100 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.916000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:11.720599 kubelet[1940]: E1213 14:23:11.720526 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:12.299453 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4208211165.mount: Deactivated successfully. Dec 13 14:23:12.517997 env[1206]: time="2024-12-13T14:23:12.517932941Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:12.519930 env[1206]: time="2024-12-13T14:23:12.519877095Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:12.521730 env[1206]: time="2024-12-13T14:23:12.521688385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:12.523202 env[1206]: time="2024-12-13T14:23:12.523178657Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:12.523665 env[1206]: time="2024-12-13T14:23:12.523632549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:23:12.524669 env[1206]: time="2024-12-13T14:23:12.524647178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:23:12.525822 env[1206]: time="2024-12-13T14:23:12.525781577Z" level=info msg="CreateContainer within sandbox \"736eb031c1415b0494998945212c7a0066517bcf01b8e492ab0cc72a8745e28c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:23:12.541544 env[1206]: time="2024-12-13T14:23:12.541489602Z" level=info msg="CreateContainer within sandbox \"736eb031c1415b0494998945212c7a0066517bcf01b8e492ab0cc72a8745e28c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ef2de718c567c9eca97bec0a613a1ccf34207f933c786ecd08e292c856442354\"" Dec 13 14:23:12.542071 env[1206]: time="2024-12-13T14:23:12.542049337Z" level=info msg="StartContainer for \"ef2de718c567c9eca97bec0a613a1ccf34207f933c786ecd08e292c856442354\"" Dec 13 14:23:12.559312 systemd[1]: Started cri-containerd-ef2de718c567c9eca97bec0a613a1ccf34207f933c786ecd08e292c856442354.scope. Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fbad447b4d8 items=0 ppid=2371 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:12.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566326465373138633536376339656361393762656330613631336131 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit: BPF prog-id=123 op=LOAD Dec 13 14:23:12.573000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000221388 items=0 ppid=2371 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:12.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566326465373138633536376339656361393762656330613631336131 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.573000 audit: BPF prog-id=124 op=LOAD Dec 13 14:23:12.573000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002213d8 items=0 ppid=2371 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:12.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566326465373138633536376339656361393762656330613631336131 Dec 13 14:23:12.574000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:23:12.574000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:12.574000 audit: BPF prog-id=125 op=LOAD Dec 13 14:23:12.574000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000221468 items=0 ppid=2371 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:12.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566326465373138633536376339656361393762656330613631336131 Dec 13 14:23:12.595512 env[1206]: time="2024-12-13T14:23:12.595427674Z" level=info msg="StartContainer for \"ef2de718c567c9eca97bec0a613a1ccf34207f933c786ecd08e292c856442354\" returns successfully" Dec 13 14:23:12.601054 systemd[1]: cri-containerd-ef2de718c567c9eca97bec0a613a1ccf34207f933c786ecd08e292c856442354.scope: Deactivated successfully. Dec 13 14:23:12.605000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:23:12.771371 kubelet[1940]: E1213 14:23:12.771333 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:13.030178 env[1206]: time="2024-12-13T14:23:13.030083156Z" level=info msg="shim disconnected" id=ef2de718c567c9eca97bec0a613a1ccf34207f933c786ecd08e292c856442354 Dec 13 14:23:13.030178 env[1206]: time="2024-12-13T14:23:13.030138673Z" level=warning msg="cleaning up after shim disconnected" id=ef2de718c567c9eca97bec0a613a1ccf34207f933c786ecd08e292c856442354 namespace=k8s.io Dec 13 14:23:13.030178 env[1206]: time="2024-12-13T14:23:13.030151968Z" level=info msg="cleaning up dead shim" Dec 13 14:23:13.037944 env[1206]: time="2024-12-13T14:23:13.037830865Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:23:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2504 runtime=io.containerd.runc.v2\n" Dec 13 14:23:13.248191 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ef2de718c567c9eca97bec0a613a1ccf34207f933c786ecd08e292c856442354-rootfs.mount: Deactivated successfully. Dec 13 14:23:13.720539 kubelet[1940]: E1213 14:23:13.720463 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:13.773740 kubelet[1940]: E1213 14:23:13.773694 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:15.721163 kubelet[1940]: E1213 14:23:15.721088 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:15.896337 env[1206]: time="2024-12-13T14:23:15.896238803Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:15.900043 env[1206]: time="2024-12-13T14:23:15.899996031Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:15.901737 env[1206]: time="2024-12-13T14:23:15.901697851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:15.903358 env[1206]: time="2024-12-13T14:23:15.903314137Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:15.903794 env[1206]: time="2024-12-13T14:23:15.903758289Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:23:15.904878 env[1206]: time="2024-12-13T14:23:15.904815864Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:23:15.912117 env[1206]: time="2024-12-13T14:23:15.910527036Z" level=info msg="CreateContainer within sandbox \"cbe77cd68f8967f6bb6ccab6e4b6e3d6d7492804374b2ddecbf97b2d9ea6c29a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:23:15.928535 env[1206]: time="2024-12-13T14:23:15.928471643Z" level=info msg="CreateContainer within sandbox \"cbe77cd68f8967f6bb6ccab6e4b6e3d6d7492804374b2ddecbf97b2d9ea6c29a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"420ec1678c44be47a8cf238c96be0faa75aa2ae856d4bbfebf9484fe8505e20d\"" Dec 13 14:23:15.929053 env[1206]: time="2024-12-13T14:23:15.928968696Z" level=info msg="StartContainer for \"420ec1678c44be47a8cf238c96be0faa75aa2ae856d4bbfebf9484fe8505e20d\"" Dec 13 14:23:15.947333 systemd[1]: Started cri-containerd-420ec1678c44be47a8cf238c96be0faa75aa2ae856d4bbfebf9484fe8505e20d.scope. Dec 13 14:23:15.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.959602 kernel: kauditd_printk_skb: 166 callbacks suppressed Dec 13 14:23:15.959660 kernel: audit: type=1400 audit(1734099795.957:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.966169 kernel: audit: type=1400 audit(1734099795.957:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.966269 kernel: audit: type=1400 audit(1734099795.957:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969855 kernel: audit: type=1400 audit(1734099795.957:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.977487 kernel: audit: type=1400 audit(1734099795.957:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.985550 kernel: audit: type=1400 audit(1734099795.957:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.985619 kernel: audit: type=1400 audit(1734099795.957:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.985650 kernel: audit: type=1400 audit(1734099795.957:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.992677 kernel: audit: type=1400 audit(1734099795.957:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.992733 kernel: audit: type=1400 audit(1734099795.961:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.961000 audit: BPF prog-id=126 op=LOAD Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2385 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:15.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306563313637386334346265343761386366323338633936626530 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=2385 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:15.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306563313637386334346265343761386366323338633936626530 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.962000 audit: BPF prog-id=127 op=LOAD Dec 13 14:23:15.962000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000098c80 items=0 ppid=2385 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:15.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306563313637386334346265343761386366323338633936626530 Dec 13 14:23:15.969000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.969000 audit: BPF prog-id=128 op=LOAD Dec 13 14:23:15.969000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000098cc8 items=0 ppid=2385 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:15.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306563313637386334346265343761386366323338633936626530 Dec 13 14:23:15.972000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:23:15.972000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.972000 audit: BPF prog-id=129 op=LOAD Dec 13 14:23:15.972000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0000990d8 items=0 ppid=2385 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:15.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306563313637386334346265343761386366323338633936626530 Dec 13 14:23:16.023300 env[1206]: time="2024-12-13T14:23:16.023211990Z" level=info msg="StartContainer for \"420ec1678c44be47a8cf238c96be0faa75aa2ae856d4bbfebf9484fe8505e20d\" returns successfully" Dec 13 14:23:16.779278 kubelet[1940]: E1213 14:23:16.779250 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:17.721492 kubelet[1940]: E1213 14:23:17.721430 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:17.781462 kubelet[1940]: I1213 14:23:17.781422 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:23:17.781812 kubelet[1940]: E1213 14:23:17.781774 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:19.720520 kubelet[1940]: E1213 14:23:19.720445 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:21.721168 kubelet[1940]: E1213 14:23:21.721101 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:22.345945 env[1206]: time="2024-12-13T14:23:22.345878291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:22.347721 env[1206]: time="2024-12-13T14:23:22.347661823Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:22.349266 env[1206]: time="2024-12-13T14:23:22.349231305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:22.350598 env[1206]: time="2024-12-13T14:23:22.350573074Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:22.351003 env[1206]: time="2024-12-13T14:23:22.350983627Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:23:22.353387 env[1206]: time="2024-12-13T14:23:22.353358285Z" level=info msg="CreateContainer within sandbox \"736eb031c1415b0494998945212c7a0066517bcf01b8e492ab0cc72a8745e28c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:23:22.369024 env[1206]: time="2024-12-13T14:23:22.368975828Z" level=info msg="CreateContainer within sandbox \"736eb031c1415b0494998945212c7a0066517bcf01b8e492ab0cc72a8745e28c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9655cd67c73042f903871203563d9ab232c25477ff62290db0df667580cfb042\"" Dec 13 14:23:22.369471 env[1206]: time="2024-12-13T14:23:22.369447407Z" level=info msg="StartContainer for \"9655cd67c73042f903871203563d9ab232c25477ff62290db0df667580cfb042\"" Dec 13 14:23:22.392637 systemd[1]: Started cri-containerd-9655cd67c73042f903871203563d9ab232c25477ff62290db0df667580cfb042.scope. Dec 13 14:23:22.401000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.404949 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:23:22.405001 kernel: audit: type=1400 audit(1734099802.401:976): avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.401000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f06f42993e8 items=0 ppid=2371 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:22.415122 kernel: audit: type=1300 audit(1734099802.401:976): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f06f42993e8 items=0 ppid=2371 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:22.415179 kernel: audit: type=1327 audit(1734099802.401:976): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353563643637633733303432663930333837313230333536336439 Dec 13 14:23:22.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353563643637633733303432663930333837313230333536336439 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.424277 kernel: audit: type=1400 audit(1734099802.402:977): avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.424318 kernel: audit: type=1400 audit(1734099802.402:977): avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.431915 kernel: audit: type=1400 audit(1734099802.402:977): avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.431984 kernel: audit: type=1400 audit(1734099802.402:977): avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.436007 kernel: audit: type=1400 audit(1734099802.402:977): avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.438540 env[1206]: time="2024-12-13T14:23:22.438497053Z" level=info msg="StartContainer for \"9655cd67c73042f903871203563d9ab232c25477ff62290db0df667580cfb042\" returns successfully" Dec 13 14:23:22.440704 kernel: audit: type=1400 audit(1734099802.402:977): avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.448221 kernel: audit: type=1400 audit(1734099802.402:977): avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.402000 audit: BPF prog-id=130 op=LOAD Dec 13 14:23:22.402000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00028aff8 items=0 ppid=2371 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:22.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353563643637633733303432663930333837313230333536336439 Dec 13 14:23:22.403000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.403000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.403000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.403000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.403000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.403000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.403000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.403000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.403000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.403000 audit: BPF prog-id=131 op=LOAD Dec 13 14:23:22.403000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00028b048 items=0 ppid=2371 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:22.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353563643637633733303432663930333837313230333536336439 Dec 13 14:23:22.407000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:23:22.407000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:22.407000 audit: BPF prog-id=132 op=LOAD Dec 13 14:23:22.407000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00028b0d8 items=0 ppid=2371 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:22.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353563643637633733303432663930333837313230333536336439 Dec 13 14:23:22.788957 kubelet[1940]: E1213 14:23:22.788475 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:23.029509 kubelet[1940]: I1213 14:23:23.029416 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-77cc4f4569-lckvf" podStartSLOduration=7.737349313 podStartE2EDuration="13.029395283s" podCreationTimestamp="2024-12-13 14:23:10 +0000 UTC" firstStartedPulling="2024-12-13 14:23:10.612526348 +0000 UTC m=+14.976523080" lastFinishedPulling="2024-12-13 14:23:15.904572308 +0000 UTC m=+20.268569050" observedRunningTime="2024-12-13 14:23:16.799173884 +0000 UTC m=+21.163170636" watchObservedRunningTime="2024-12-13 14:23:23.029395283 +0000 UTC m=+27.393392035" Dec 13 14:23:23.720640 kubelet[1940]: E1213 14:23:23.720562 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:23.789860 kubelet[1940]: E1213 14:23:23.789805 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:23.858474 systemd[1]: cri-containerd-9655cd67c73042f903871203563d9ab232c25477ff62290db0df667580cfb042.scope: Deactivated successfully. Dec 13 14:23:23.862000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:23:23.875505 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9655cd67c73042f903871203563d9ab232c25477ff62290db0df667580cfb042-rootfs.mount: Deactivated successfully. Dec 13 14:23:23.877688 kubelet[1940]: I1213 14:23:23.876976 1940 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:23:23.922043 systemd[1]: Created slice kubepods-besteffort-podff494c46_81af_4525_a624_22909b19eeb7.slice. Dec 13 14:23:23.931510 systemd[1]: Created slice kubepods-besteffort-pod1e7ff74d_aead_442a_8f68_a0517ddd74e7.slice. Dec 13 14:23:23.937409 systemd[1]: Created slice kubepods-burstable-pod0a5a6be7_8147_4be4_b939_7481abcb12ec.slice. Dec 13 14:23:23.948317 systemd[1]: Created slice kubepods-besteffort-pod795f1f51_9efb_40d4_81a9_a5178b33107e.slice. Dec 13 14:23:23.951995 systemd[1]: Created slice kubepods-burstable-poda0fe477f_17fd_4d57_900b_ffc23cea95e4.slice. Dec 13 14:23:24.098396 kubelet[1940]: I1213 14:23:24.098336 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/795f1f51-9efb-40d4-81a9-a5178b33107e-calico-apiserver-certs\") pod \"calico-apiserver-6d8bbbc697-bkcck\" (UID: \"795f1f51-9efb-40d4-81a9-a5178b33107e\") " pod="calico-apiserver/calico-apiserver-6d8bbbc697-bkcck" Dec 13 14:23:24.098396 kubelet[1940]: I1213 14:23:24.098396 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7cz8\" (UniqueName: \"kubernetes.io/projected/1e7ff74d-aead-442a-8f68-a0517ddd74e7-kube-api-access-j7cz8\") pod \"calico-kube-controllers-7b9b6c69b5-qsx5x\" (UID: \"1e7ff74d-aead-442a-8f68-a0517ddd74e7\") " pod="calico-system/calico-kube-controllers-7b9b6c69b5-qsx5x" Dec 13 14:23:24.098396 kubelet[1940]: I1213 14:23:24.098426 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pq8fn\" (UniqueName: \"kubernetes.io/projected/0a5a6be7-8147-4be4-b939-7481abcb12ec-kube-api-access-pq8fn\") pod \"coredns-6f6b679f8f-hkncl\" (UID: \"0a5a6be7-8147-4be4-b939-7481abcb12ec\") " pod="kube-system/coredns-6f6b679f8f-hkncl" Dec 13 14:23:24.098706 kubelet[1940]: I1213 14:23:24.098462 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0a5a6be7-8147-4be4-b939-7481abcb12ec-config-volume\") pod \"coredns-6f6b679f8f-hkncl\" (UID: \"0a5a6be7-8147-4be4-b939-7481abcb12ec\") " pod="kube-system/coredns-6f6b679f8f-hkncl" Dec 13 14:23:24.098706 kubelet[1940]: I1213 14:23:24.098486 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1e7ff74d-aead-442a-8f68-a0517ddd74e7-tigera-ca-bundle\") pod \"calico-kube-controllers-7b9b6c69b5-qsx5x\" (UID: \"1e7ff74d-aead-442a-8f68-a0517ddd74e7\") " pod="calico-system/calico-kube-controllers-7b9b6c69b5-qsx5x" Dec 13 14:23:24.098706 kubelet[1940]: I1213 14:23:24.098517 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7c5h\" (UniqueName: \"kubernetes.io/projected/ff494c46-81af-4525-a624-22909b19eeb7-kube-api-access-f7c5h\") pod \"calico-apiserver-6d8bbbc697-k25fw\" (UID: \"ff494c46-81af-4525-a624-22909b19eeb7\") " pod="calico-apiserver/calico-apiserver-6d8bbbc697-k25fw" Dec 13 14:23:24.098706 kubelet[1940]: I1213 14:23:24.098549 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-45k5s\" (UniqueName: \"kubernetes.io/projected/795f1f51-9efb-40d4-81a9-a5178b33107e-kube-api-access-45k5s\") pod \"calico-apiserver-6d8bbbc697-bkcck\" (UID: \"795f1f51-9efb-40d4-81a9-a5178b33107e\") " pod="calico-apiserver/calico-apiserver-6d8bbbc697-bkcck" Dec 13 14:23:24.098706 kubelet[1940]: I1213 14:23:24.098572 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a0fe477f-17fd-4d57-900b-ffc23cea95e4-config-volume\") pod \"coredns-6f6b679f8f-hcgzs\" (UID: \"a0fe477f-17fd-4d57-900b-ffc23cea95e4\") " pod="kube-system/coredns-6f6b679f8f-hcgzs" Dec 13 14:23:24.098833 kubelet[1940]: I1213 14:23:24.098592 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ff494c46-81af-4525-a624-22909b19eeb7-calico-apiserver-certs\") pod \"calico-apiserver-6d8bbbc697-k25fw\" (UID: \"ff494c46-81af-4525-a624-22909b19eeb7\") " pod="calico-apiserver/calico-apiserver-6d8bbbc697-k25fw" Dec 13 14:23:24.098833 kubelet[1940]: I1213 14:23:24.098636 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jpxbf\" (UniqueName: \"kubernetes.io/projected/a0fe477f-17fd-4d57-900b-ffc23cea95e4-kube-api-access-jpxbf\") pod \"coredns-6f6b679f8f-hcgzs\" (UID: \"a0fe477f-17fd-4d57-900b-ffc23cea95e4\") " pod="kube-system/coredns-6f6b679f8f-hcgzs" Dec 13 14:23:24.255467 kubelet[1940]: E1213 14:23:24.255414 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:24.259815 env[1206]: time="2024-12-13T14:23:24.259763775Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d8bbbc697-bkcck,Uid:795f1f51-9efb-40d4-81a9-a5178b33107e,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:23:24.260381 env[1206]: time="2024-12-13T14:23:24.260353609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hcgzs,Uid:a0fe477f-17fd-4d57-900b-ffc23cea95e4,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:24.357709 env[1206]: time="2024-12-13T14:23:24.357583884Z" level=info msg="shim disconnected" id=9655cd67c73042f903871203563d9ab232c25477ff62290db0df667580cfb042 Dec 13 14:23:24.357709 env[1206]: time="2024-12-13T14:23:24.357627556Z" level=warning msg="cleaning up after shim disconnected" id=9655cd67c73042f903871203563d9ab232c25477ff62290db0df667580cfb042 namespace=k8s.io Dec 13 14:23:24.357709 env[1206]: time="2024-12-13T14:23:24.357638106Z" level=info msg="cleaning up dead shim" Dec 13 14:23:24.363915 env[1206]: time="2024-12-13T14:23:24.363877102Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:23:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2617 runtime=io.containerd.runc.v2\n" Dec 13 14:23:24.535837 env[1206]: time="2024-12-13T14:23:24.535771529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b9b6c69b5-qsx5x,Uid:1e7ff74d-aead-442a-8f68-a0517ddd74e7,Namespace:calico-system,Attempt:0,}" Dec 13 14:23:24.537030 env[1206]: time="2024-12-13T14:23:24.535910314Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d8bbbc697-k25fw,Uid:ff494c46-81af-4525-a624-22909b19eeb7,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:23:24.543410 kubelet[1940]: E1213 14:23:24.543380 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:24.543957 env[1206]: time="2024-12-13T14:23:24.543886229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hkncl,Uid:0a5a6be7-8147-4be4-b939-7481abcb12ec,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:24.794864 kubelet[1940]: E1213 14:23:24.794630 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:24.797287 env[1206]: time="2024-12-13T14:23:24.796982825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:23:24.816593 env[1206]: time="2024-12-13T14:23:24.816504937Z" level=error msg="Failed to destroy network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.817128 env[1206]: time="2024-12-13T14:23:24.817097205Z" level=error msg="encountered an error cleaning up failed sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.817192 env[1206]: time="2024-12-13T14:23:24.817153342Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hcgzs,Uid:a0fe477f-17fd-4d57-900b-ffc23cea95e4,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.817491 kubelet[1940]: E1213 14:23:24.817431 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.817588 kubelet[1940]: E1213 14:23:24.817535 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-hcgzs" Dec 13 14:23:24.817588 kubelet[1940]: E1213 14:23:24.817574 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-hcgzs" Dec 13 14:23:24.817672 kubelet[1940]: E1213 14:23:24.817638 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-hcgzs_kube-system(a0fe477f-17fd-4d57-900b-ffc23cea95e4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-hcgzs_kube-system(a0fe477f-17fd-4d57-900b-ffc23cea95e4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-hcgzs" podUID="a0fe477f-17fd-4d57-900b-ffc23cea95e4" Dec 13 14:23:24.822253 env[1206]: time="2024-12-13T14:23:24.822212430Z" level=error msg="Failed to destroy network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.822555 env[1206]: time="2024-12-13T14:23:24.822519585Z" level=error msg="encountered an error cleaning up failed sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.822610 env[1206]: time="2024-12-13T14:23:24.822566154Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d8bbbc697-bkcck,Uid:795f1f51-9efb-40d4-81a9-a5178b33107e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.822792 kubelet[1940]: E1213 14:23:24.822756 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.822870 kubelet[1940]: E1213 14:23:24.822815 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d8bbbc697-bkcck" Dec 13 14:23:24.822870 kubelet[1940]: E1213 14:23:24.822835 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d8bbbc697-bkcck" Dec 13 14:23:24.822934 kubelet[1940]: E1213 14:23:24.822891 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6d8bbbc697-bkcck_calico-apiserver(795f1f51-9efb-40d4-81a9-a5178b33107e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6d8bbbc697-bkcck_calico-apiserver(795f1f51-9efb-40d4-81a9-a5178b33107e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d8bbbc697-bkcck" podUID="795f1f51-9efb-40d4-81a9-a5178b33107e" Dec 13 14:23:24.837672 env[1206]: time="2024-12-13T14:23:24.837609273Z" level=error msg="Failed to destroy network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.838014 env[1206]: time="2024-12-13T14:23:24.837987232Z" level=error msg="encountered an error cleaning up failed sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.838066 env[1206]: time="2024-12-13T14:23:24.838035926Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b9b6c69b5-qsx5x,Uid:1e7ff74d-aead-442a-8f68-a0517ddd74e7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.838301 kubelet[1940]: E1213 14:23:24.838261 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.838365 kubelet[1940]: E1213 14:23:24.838335 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7b9b6c69b5-qsx5x" Dec 13 14:23:24.838365 kubelet[1940]: E1213 14:23:24.838355 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7b9b6c69b5-qsx5x" Dec 13 14:23:24.838420 kubelet[1940]: E1213 14:23:24.838391 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7b9b6c69b5-qsx5x_calico-system(1e7ff74d-aead-442a-8f68-a0517ddd74e7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7b9b6c69b5-qsx5x_calico-system(1e7ff74d-aead-442a-8f68-a0517ddd74e7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7b9b6c69b5-qsx5x" podUID="1e7ff74d-aead-442a-8f68-a0517ddd74e7" Dec 13 14:23:24.840401 env[1206]: time="2024-12-13T14:23:24.840340015Z" level=error msg="Failed to destroy network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.840907 env[1206]: time="2024-12-13T14:23:24.840869413Z" level=error msg="encountered an error cleaning up failed sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.840977 env[1206]: time="2024-12-13T14:23:24.840919700Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hkncl,Uid:0a5a6be7-8147-4be4-b939-7481abcb12ec,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.841165 kubelet[1940]: E1213 14:23:24.841137 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.841235 kubelet[1940]: E1213 14:23:24.841179 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-hkncl" Dec 13 14:23:24.841235 kubelet[1940]: E1213 14:23:24.841194 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-hkncl" Dec 13 14:23:24.841235 kubelet[1940]: E1213 14:23:24.841219 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-hkncl_kube-system(0a5a6be7-8147-4be4-b939-7481abcb12ec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-hkncl_kube-system(0a5a6be7-8147-4be4-b939-7481abcb12ec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-hkncl" podUID="0a5a6be7-8147-4be4-b939-7481abcb12ec" Dec 13 14:23:24.851210 env[1206]: time="2024-12-13T14:23:24.851139719Z" level=error msg="Failed to destroy network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.851537 env[1206]: time="2024-12-13T14:23:24.851503833Z" level=error msg="encountered an error cleaning up failed sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.851604 env[1206]: time="2024-12-13T14:23:24.851562896Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d8bbbc697-k25fw,Uid:ff494c46-81af-4525-a624-22909b19eeb7,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.851854 kubelet[1940]: E1213 14:23:24.851804 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:24.851917 kubelet[1940]: E1213 14:23:24.851898 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d8bbbc697-k25fw" Dec 13 14:23:24.851947 kubelet[1940]: E1213 14:23:24.851917 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d8bbbc697-k25fw" Dec 13 14:23:24.851985 kubelet[1940]: E1213 14:23:24.851958 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6d8bbbc697-k25fw_calico-apiserver(ff494c46-81af-4525-a624-22909b19eeb7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6d8bbbc697-k25fw_calico-apiserver(ff494c46-81af-4525-a624-22909b19eeb7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d8bbbc697-k25fw" podUID="ff494c46-81af-4525-a624-22909b19eeb7" Dec 13 14:23:25.726015 systemd[1]: Created slice kubepods-besteffort-pod35edeb5a_c3b3_4f6f_a27a_a5f0b2e22db2.slice. Dec 13 14:23:25.728195 env[1206]: time="2024-12-13T14:23:25.728141587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g6jxc,Uid:35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2,Namespace:calico-system,Attempt:0,}" Dec 13 14:23:25.786704 env[1206]: time="2024-12-13T14:23:25.786623663Z" level=error msg="Failed to destroy network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.787096 env[1206]: time="2024-12-13T14:23:25.787053270Z" level=error msg="encountered an error cleaning up failed sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.787148 env[1206]: time="2024-12-13T14:23:25.787115739Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g6jxc,Uid:35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.787458 kubelet[1940]: E1213 14:23:25.787391 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.787554 kubelet[1940]: E1213 14:23:25.787477 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-g6jxc" Dec 13 14:23:25.787554 kubelet[1940]: E1213 14:23:25.787503 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-g6jxc" Dec 13 14:23:25.787621 kubelet[1940]: E1213 14:23:25.787552 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-g6jxc_calico-system(35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-g6jxc_calico-system(35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:25.789169 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f-shm.mount: Deactivated successfully. Dec 13 14:23:25.796931 kubelet[1940]: I1213 14:23:25.796905 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:25.797534 env[1206]: time="2024-12-13T14:23:25.797504733Z" level=info msg="StopPodSandbox for \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\"" Dec 13 14:23:25.797710 kubelet[1940]: I1213 14:23:25.797687 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:25.798225 env[1206]: time="2024-12-13T14:23:25.798193124Z" level=info msg="StopPodSandbox for \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\"" Dec 13 14:23:25.798818 kubelet[1940]: I1213 14:23:25.798789 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:25.799123 env[1206]: time="2024-12-13T14:23:25.799094139Z" level=info msg="StopPodSandbox for \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\"" Dec 13 14:23:25.803287 kubelet[1940]: I1213 14:23:25.803265 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:25.803786 env[1206]: time="2024-12-13T14:23:25.803756197Z" level=info msg="StopPodSandbox for \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\"" Dec 13 14:23:25.804718 kubelet[1940]: I1213 14:23:25.804693 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:25.805209 env[1206]: time="2024-12-13T14:23:25.805168657Z" level=info msg="StopPodSandbox for \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\"" Dec 13 14:23:25.806436 kubelet[1940]: I1213 14:23:25.806413 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:25.806756 env[1206]: time="2024-12-13T14:23:25.806710553Z" level=info msg="StopPodSandbox for \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\"" Dec 13 14:23:25.858743 env[1206]: time="2024-12-13T14:23:25.858671260Z" level=error msg="StopPodSandbox for \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\" failed" error="failed to destroy network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.859090 kubelet[1940]: E1213 14:23:25.859024 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:25.859184 kubelet[1940]: E1213 14:23:25.859114 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0"} Dec 13 14:23:25.859224 kubelet[1940]: E1213 14:23:25.859188 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a0fe477f-17fd-4d57-900b-ffc23cea95e4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:25.859318 kubelet[1940]: E1213 14:23:25.859219 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a0fe477f-17fd-4d57-900b-ffc23cea95e4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-hcgzs" podUID="a0fe477f-17fd-4d57-900b-ffc23cea95e4" Dec 13 14:23:25.887054 env[1206]: time="2024-12-13T14:23:25.886964156Z" level=error msg="StopPodSandbox for \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\" failed" error="failed to destroy network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.887275 env[1206]: time="2024-12-13T14:23:25.887192371Z" level=error msg="StopPodSandbox for \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\" failed" error="failed to destroy network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.887326 kubelet[1940]: E1213 14:23:25.887271 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:25.887399 kubelet[1940]: E1213 14:23:25.887325 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0"} Dec 13 14:23:25.887399 kubelet[1940]: E1213 14:23:25.887363 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a5a6be7-8147-4be4-b939-7481abcb12ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:25.887399 kubelet[1940]: E1213 14:23:25.887388 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a5a6be7-8147-4be4-b939-7481abcb12ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-hkncl" podUID="0a5a6be7-8147-4be4-b939-7481abcb12ec" Dec 13 14:23:25.887589 kubelet[1940]: E1213 14:23:25.887489 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:25.887589 kubelet[1940]: E1213 14:23:25.887507 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f"} Dec 13 14:23:25.887589 kubelet[1940]: E1213 14:23:25.887529 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:25.887589 kubelet[1940]: E1213 14:23:25.887564 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-g6jxc" podUID="35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2" Dec 13 14:23:25.888832 env[1206]: time="2024-12-13T14:23:25.888751190Z" level=error msg="StopPodSandbox for \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\" failed" error="failed to destroy network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.889053 kubelet[1940]: E1213 14:23:25.889007 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:25.889116 kubelet[1940]: E1213 14:23:25.889069 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e"} Dec 13 14:23:25.889148 kubelet[1940]: E1213 14:23:25.889112 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1e7ff74d-aead-442a-8f68-a0517ddd74e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:25.889220 kubelet[1940]: E1213 14:23:25.889148 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1e7ff74d-aead-442a-8f68-a0517ddd74e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7b9b6c69b5-qsx5x" podUID="1e7ff74d-aead-442a-8f68-a0517ddd74e7" Dec 13 14:23:25.896327 env[1206]: time="2024-12-13T14:23:25.896258575Z" level=error msg="StopPodSandbox for \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\" failed" error="failed to destroy network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.896567 kubelet[1940]: E1213 14:23:25.896514 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:25.896657 kubelet[1940]: E1213 14:23:25.896580 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601"} Dec 13 14:23:25.896657 kubelet[1940]: E1213 14:23:25.896618 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"795f1f51-9efb-40d4-81a9-a5178b33107e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:25.896657 kubelet[1940]: E1213 14:23:25.896644 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"795f1f51-9efb-40d4-81a9-a5178b33107e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d8bbbc697-bkcck" podUID="795f1f51-9efb-40d4-81a9-a5178b33107e" Dec 13 14:23:25.900434 env[1206]: time="2024-12-13T14:23:25.900395022Z" level=error msg="StopPodSandbox for \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\" failed" error="failed to destroy network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:25.900614 kubelet[1940]: E1213 14:23:25.900577 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:25.900666 kubelet[1940]: E1213 14:23:25.900625 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f"} Dec 13 14:23:25.900701 kubelet[1940]: E1213 14:23:25.900660 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ff494c46-81af-4525-a624-22909b19eeb7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:25.900701 kubelet[1940]: E1213 14:23:25.900685 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ff494c46-81af-4525-a624-22909b19eeb7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d8bbbc697-k25fw" podUID="ff494c46-81af-4525-a624-22909b19eeb7" Dec 13 14:23:31.539043 kubelet[1940]: I1213 14:23:31.538897 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:23:31.540810 kubelet[1940]: E1213 14:23:31.540754 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:31.820082 kubelet[1940]: E1213 14:23:31.819966 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:32.146146 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:23:32.146268 kernel: audit: type=1130 audit(1734099812.112:983): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.66:22-10.0.0.1:36708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:32.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.66:22-10.0.0.1:36708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:32.113234 systemd[1]: Started sshd@7-10.0.0.66:22-10.0.0.1:36708.service. Dec 13 14:23:32.215000 audit[3001]: USER_ACCT pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.216380 sshd[3001]: Accepted publickey for core from 10.0.0.1 port 36708 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:23:32.220000 audit[3001]: CRED_ACQ pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.223502 sshd[3001]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:32.227350 kernel: audit: type=1101 audit(1734099812.215:984): pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.227583 kernel: audit: type=1103 audit(1734099812.220:985): pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.227621 kernel: audit: type=1006 audit(1734099812.220:986): pid=3001 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Dec 13 14:23:32.229550 kernel: audit: type=1300 audit(1734099812.220:986): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde98bcb90 a2=3 a3=0 items=0 ppid=1 pid=3001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:32.220000 audit[3001]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde98bcb90 a2=3 a3=0 items=0 ppid=1 pid=3001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:32.230921 systemd[1]: Started session-8.scope. Dec 13 14:23:32.231399 systemd-logind[1197]: New session 8 of user core. Dec 13 14:23:32.235579 kernel: audit: type=1327 audit(1734099812.220:986): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:32.220000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:32.242000 audit[3001]: USER_START pid=3001 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.246000 audit[3004]: CRED_ACQ pid=3004 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.253134 kernel: audit: type=1105 audit(1734099812.242:987): pid=3001 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.253213 kernel: audit: type=1103 audit(1734099812.246:988): pid=3004 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.255000 audit[3005]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:32.255000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd05e5f60 a2=0 a3=7ffdd05e5f4c items=0 ppid=2100 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:32.264438 kernel: audit: type=1325 audit(1734099812.255:989): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:32.264523 kernel: audit: type=1300 audit(1734099812.255:989): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd05e5f60 a2=0 a3=7ffdd05e5f4c items=0 ppid=2100 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:32.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:32.266000 audit[3005]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:32.266000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdd05e5f60 a2=0 a3=7ffdd05e5f4c items=0 ppid=2100 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:32.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:32.559335 sshd[3001]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:32.560000 audit[3001]: USER_END pid=3001 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.560000 audit[3001]: CRED_DISP pid=3001 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:32.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.66:22-10.0.0.1:36708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:32.562554 systemd[1]: sshd@7-10.0.0.66:22-10.0.0.1:36708.service: Deactivated successfully. Dec 13 14:23:32.563303 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:23:32.564328 systemd-logind[1197]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:23:32.565144 systemd-logind[1197]: Removed session 8. Dec 13 14:23:35.009764 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount789206614.mount: Deactivated successfully. Dec 13 14:23:35.755697 env[1206]: time="2024-12-13T14:23:35.755622610Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:35.759874 env[1206]: time="2024-12-13T14:23:35.759795412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:35.761745 env[1206]: time="2024-12-13T14:23:35.761698674Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:35.763059 env[1206]: time="2024-12-13T14:23:35.763038628Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:35.763549 env[1206]: time="2024-12-13T14:23:35.763509401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:23:35.778064 env[1206]: time="2024-12-13T14:23:35.778010117Z" level=info msg="CreateContainer within sandbox \"736eb031c1415b0494998945212c7a0066517bcf01b8e492ab0cc72a8745e28c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:23:35.798041 env[1206]: time="2024-12-13T14:23:35.797981608Z" level=info msg="CreateContainer within sandbox \"736eb031c1415b0494998945212c7a0066517bcf01b8e492ab0cc72a8745e28c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c513a4f82d023baa443352de40e195b2bcaf63cdeaa85f3f17effdcd918bcf11\"" Dec 13 14:23:35.798647 env[1206]: time="2024-12-13T14:23:35.798609339Z" level=info msg="StartContainer for \"c513a4f82d023baa443352de40e195b2bcaf63cdeaa85f3f17effdcd918bcf11\"" Dec 13 14:23:35.814655 systemd[1]: Started cri-containerd-c513a4f82d023baa443352de40e195b2bcaf63cdeaa85f3f17effdcd918bcf11.scope. Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fcd1d5d3858 items=0 ppid=2371 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335313361346638326430323362616134343333353264653430653139 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.833000 audit: BPF prog-id=133 op=LOAD Dec 13 14:23:35.833000 audit[3032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00032dbd8 items=0 ppid=2371 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335313361346638326430323362616134343333353264653430653139 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit: BPF prog-id=134 op=LOAD Dec 13 14:23:35.834000 audit[3032]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00032dc28 items=0 ppid=2371 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335313361346638326430323362616134343333353264653430653139 Dec 13 14:23:35.834000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:23:35.834000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.834000 audit: BPF prog-id=135 op=LOAD Dec 13 14:23:35.834000 audit[3032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00032dcb8 items=0 ppid=2371 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335313361346638326430323362616134343333353264653430653139 Dec 13 14:23:36.164866 env[1206]: time="2024-12-13T14:23:36.164791296Z" level=info msg="StartContainer for \"c513a4f82d023baa443352de40e195b2bcaf63cdeaa85f3f17effdcd918bcf11\" returns successfully" Dec 13 14:23:36.177733 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:23:36.177981 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:23:36.721152 env[1206]: time="2024-12-13T14:23:36.721069374Z" level=info msg="StopPodSandbox for \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\"" Dec 13 14:23:36.721406 env[1206]: time="2024-12-13T14:23:36.721186607Z" level=info msg="StopPodSandbox for \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\"" Dec 13 14:23:36.834692 kubelet[1940]: E1213 14:23:36.834645 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:37.198974 kubelet[1940]: I1213 14:23:37.198903 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-s9pd8" podStartSLOduration=2.026878729 podStartE2EDuration="27.198881131s" podCreationTimestamp="2024-12-13 14:23:10 +0000 UTC" firstStartedPulling="2024-12-13 14:23:10.592742144 +0000 UTC m=+14.956738876" lastFinishedPulling="2024-12-13 14:23:35.764744536 +0000 UTC m=+40.128741278" observedRunningTime="2024-12-13 14:23:37.039693826 +0000 UTC m=+41.403690558" watchObservedRunningTime="2024-12-13 14:23:37.198881131 +0000 UTC m=+41.562877863" Dec 13 14:23:37.426000 audit[3228]: AVC avc: denied { write } for pid=3228 comm="tee" name="fd" dev="proc" ino=25678 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:23:37.428196 kernel: kauditd_printk_skb: 50 callbacks suppressed Dec 13 14:23:37.428269 kernel: audit: type=1400 audit(1734099817.426:1000): avc: denied { write } for pid=3228 comm="tee" name="fd" dev="proc" ino=25678 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:23:37.426000 audit[3228]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc44dc9a28 a2=241 a3=1b6 items=1 ppid=3184 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.436877 kernel: audit: type=1300 audit(1734099817.426:1000): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc44dc9a28 a2=241 a3=1b6 items=1 ppid=3184 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.436955 kernel: audit: type=1307 audit(1734099817.426:1000): cwd="/etc/service/enabled/cni/log" Dec 13 14:23:37.426000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:23:37.426000 audit: PATH item=0 name="/dev/fd/63" inode=23465 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:37.441763 kernel: audit: type=1302 audit(1734099817.426:1000): item=0 name="/dev/fd/63" inode=23465 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:37.426000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:23:37.446869 kernel: audit: type=1327 audit(1734099817.426:1000): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:23:37.427000 audit[3239]: AVC avc: denied { write } for pid=3239 comm="tee" name="fd" dev="proc" ino=25687 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:23:37.455837 kernel: audit: type=1400 audit(1734099817.427:1001): avc: denied { write } for pid=3239 comm="tee" name="fd" dev="proc" ino=25687 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:23:37.455921 kernel: audit: type=1300 audit(1734099817.427:1001): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4175fa16 a2=241 a3=1b6 items=1 ppid=3194 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.427000 audit[3239]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4175fa16 a2=241 a3=1b6 items=1 ppid=3194 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.427000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:23:37.460873 kernel: audit: type=1307 audit(1734099817.427:1001): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:23:37.427000 audit: PATH item=0 name="/dev/fd/63" inode=25684 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:37.467362 kernel: audit: type=1302 audit(1734099817.427:1001): item=0 name="/dev/fd/63" inode=25684 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:37.467429 kernel: audit: type=1327 audit(1734099817.427:1001): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:23:37.427000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:23:37.431000 audit[3233]: AVC avc: denied { write } for pid=3233 comm="tee" name="fd" dev="proc" ino=25696 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:23:37.431000 audit[3233]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc67900a26 a2=241 a3=1b6 items=1 ppid=3190 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.431000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:23:37.431000 audit: PATH item=0 name="/dev/fd/63" inode=24749 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:37.431000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:23:37.431000 audit[3246]: AVC avc: denied { write } for pid=3246 comm="tee" name="fd" dev="proc" ino=25700 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:23:37.431000 audit[3246]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0c569a17 a2=241 a3=1b6 items=1 ppid=3191 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.431000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:23:37.431000 audit: PATH item=0 name="/dev/fd/63" inode=25693 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:37.431000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:23:37.438000 audit[3251]: AVC avc: denied { write } for pid=3251 comm="tee" name="fd" dev="proc" ino=25707 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:23:37.438000 audit[3251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8d318a27 a2=241 a3=1b6 items=1 ppid=3196 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.438000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:23:37.438000 audit: PATH item=0 name="/dev/fd/63" inode=25704 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:37.438000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:23:37.456000 audit[3258]: AVC avc: denied { write } for pid=3258 comm="tee" name="fd" dev="proc" ino=24759 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:23:37.456000 audit[3258]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff92226a26 a2=241 a3=1b6 items=1 ppid=3186 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.456000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:23:37.456000 audit: PATH item=0 name="/dev/fd/63" inode=23473 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:37.456000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:23:37.458000 audit[3260]: AVC avc: denied { write } for pid=3260 comm="tee" name="fd" dev="proc" ino=25715 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:23:37.458000 audit[3260]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc19e6fa26 a2=241 a3=1b6 items=1 ppid=3188 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.458000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:23:37.458000 audit: PATH item=0 name="/dev/fd/63" inode=25711 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:37.458000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:23:37.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.66:22-10.0.0.1:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:37.565446 systemd[1]: Started sshd@8-10.0.0.66:22-10.0.0.1:36714.service. Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit: BPF prog-id=136 op=LOAD Dec 13 14:23:37.605000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5e839c80 a2=98 a3=3 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.605000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit: BPF prog-id=137 op=LOAD Dec 13 14:23:37.605000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5e839a60 a2=74 a3=540051 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.605000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.605000 audit: BPF prog-id=138 op=LOAD Dec 13 14:23:37.605000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5e839a90 a2=94 a3=2 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.605000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:23:37.612000 audit[3275]: USER_ACCT pid=3275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:37.613639 sshd[3275]: Accepted publickey for core from 10.0.0.1 port 36714 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:23:37.614000 audit[3275]: CRED_ACQ pid=3275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:37.614000 audit[3275]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4a92a980 a2=3 a3=0 items=0 ppid=1 pid=3275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.614000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:37.617246 sshd[3275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:37.622869 systemd[1]: Started session-9.scope. Dec 13 14:23:37.623982 systemd-logind[1197]: New session 9 of user core. Dec 13 14:23:37.628000 audit[3275]: USER_START pid=3275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:37.629000 audit[3306]: CRED_ACQ pid=3306 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.200 [INFO][3127] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.200 [INFO][3127] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" iface="eth0" netns="/var/run/netns/cni-fcc6c821-1663-d234-cfb6-6129dfcedea4" Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.200 [INFO][3127] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" iface="eth0" netns="/var/run/netns/cni-fcc6c821-1663-d234-cfb6-6129dfcedea4" Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.204 [INFO][3127] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" iface="eth0" netns="/var/run/netns/cni-fcc6c821-1663-d234-cfb6-6129dfcedea4" Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.204 [INFO][3127] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.204 [INFO][3127] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.639 [INFO][3164] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" HandleID="k8s-pod-network.052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.641 [INFO][3164] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.642 [INFO][3164] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.649 [WARNING][3164] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" HandleID="k8s-pod-network.052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.649 [INFO][3164] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" HandleID="k8s-pod-network.052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.650 [INFO][3164] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:37.654883 env[1206]: 2024-12-13 14:23:37.653 [INFO][3127] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:37.657993 env[1206]: time="2024-12-13T14:23:37.655046506Z" level=info msg="TearDown network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\" successfully" Dec 13 14:23:37.657993 env[1206]: time="2024-12-13T14:23:37.655078848Z" level=info msg="StopPodSandbox for \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\" returns successfully" Dec 13 14:23:37.657993 env[1206]: time="2024-12-13T14:23:37.655803333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g6jxc,Uid:35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2,Namespace:calico-system,Attempt:1,}" Dec 13 14:23:37.657275 systemd[1]: run-netns-cni\x2dfcc6c821\x2d1663\x2dd234\x2dcfb6\x2d6129dfcedea4.mount: Deactivated successfully. Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.199 [INFO][3128] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.200 [INFO][3128] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" iface="eth0" netns="/var/run/netns/cni-f08d6135-a212-1ba2-eccc-8f9f85f1fe59" Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.200 [INFO][3128] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" iface="eth0" netns="/var/run/netns/cni-f08d6135-a212-1ba2-eccc-8f9f85f1fe59" Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.204 [INFO][3128] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" iface="eth0" netns="/var/run/netns/cni-f08d6135-a212-1ba2-eccc-8f9f85f1fe59" Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.204 [INFO][3128] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.204 [INFO][3128] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.634 [INFO][3165] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" HandleID="k8s-pod-network.22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.642 [INFO][3165] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.650 [INFO][3165] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.655 [WARNING][3165] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" HandleID="k8s-pod-network.22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.655 [INFO][3165] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" HandleID="k8s-pod-network.22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.657 [INFO][3165] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:37.661693 env[1206]: 2024-12-13 14:23:37.660 [INFO][3128] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:37.664107 env[1206]: time="2024-12-13T14:23:37.662102084Z" level=info msg="TearDown network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\" successfully" Dec 13 14:23:37.664107 env[1206]: time="2024-12-13T14:23:37.662163009Z" level=info msg="StopPodSandbox for \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\" returns successfully" Dec 13 14:23:37.664107 env[1206]: time="2024-12-13T14:23:37.662701060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d8bbbc697-bkcck,Uid:795f1f51-9efb-40d4-81a9-a5178b33107e,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:23:37.663723 systemd[1]: run-netns-cni\x2df08d6135\x2da212\x2d1ba2\x2deccc\x2d8f9f85f1fe59.mount: Deactivated successfully. Dec 13 14:23:37.721523 env[1206]: time="2024-12-13T14:23:37.721357595Z" level=info msg="StopPodSandbox for \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\"" Dec 13 14:23:37.728000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.728000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.728000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.728000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.728000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.728000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.728000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.728000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.728000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.728000 audit: BPF prog-id=139 op=LOAD Dec 13 14:23:37.728000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5e839950 a2=40 a3=1 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.728000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.729000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:23:37.729000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.729000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff5e839a20 a2=50 a3=7fff5e839b00 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.729000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.738000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.738000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e839960 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.738000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.738000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.738000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e839990 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.738000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.738000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.738000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e8398a0 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.738000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.739000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.739000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e8399b0 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.739000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.739000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.739000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e839990 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.739000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.739000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.739000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e839980 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.739000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.739000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.739000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e8399b0 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.739000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.739000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.739000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e839990 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.739000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.740000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.740000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e8399b0 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.740000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.740000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e839980 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.740000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.740000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e8399f0 a2=28 a3=0 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff5e8397a0 a2=50 a3=1 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.741000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.741000 audit: BPF prog-id=140 op=LOAD Dec 13 14:23:37.741000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5e8397a0 a2=94 a3=5 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.741000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.742000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff5e839850 a2=50 a3=1 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.742000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff5e839970 a2=4 a3=38 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.742000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.742000 audit[3305]: AVC avc: denied { confidentiality } for pid=3305 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:37.742000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5e8399c0 a2=94 a3=6 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.742000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.743000 audit[3305]: AVC avc: denied { confidentiality } for pid=3305 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:37.743000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5e839170 a2=94 a3=83 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.743000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.744000 audit[3305]: AVC avc: denied { confidentiality } for pid=3305 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:37.744000 audit[3305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5e839170 a2=94 a3=83 items=0 ppid=3187 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:23:37.751000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.751000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.751000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.751000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.751000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.751000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.751000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.751000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.751000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.751000 audit: BPF prog-id=141 op=LOAD Dec 13 14:23:37.751000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc92982c40 a2=98 a3=1999999999999999 items=0 ppid=3187 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.751000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:23:37.752000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:23:37.752000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.752000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.752000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.752000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.752000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.752000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.752000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.752000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.752000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.752000 audit: BPF prog-id=142 op=LOAD Dec 13 14:23:37.752000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc92982b20 a2=74 a3=ffff items=0 ppid=3187 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.752000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:23:37.753000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:23:37.753000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.753000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.753000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.753000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.753000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.753000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.753000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.753000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.753000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.753000 audit: BPF prog-id=143 op=LOAD Dec 13 14:23:37.753000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc92982b60 a2=40 a3=7ffc92982d40 items=0 ppid=3187 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.753000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:23:37.754000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:23:37.807294 systemd-networkd[1026]: vxlan.calico: Link UP Dec 13 14:23:37.807305 systemd-networkd[1026]: vxlan.calico: Gained carrier Dec 13 14:23:37.824000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.824000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.824000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.824000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.824000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.824000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.824000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.824000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.824000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.824000 audit: BPF prog-id=144 op=LOAD Dec 13 14:23:37.824000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcae6f8a50 a2=98 a3=ffffffff items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.825000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:23:37.826000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.826000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.826000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.826000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.826000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.826000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.826000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.826000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.826000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.826000 audit: BPF prog-id=145 op=LOAD Dec 13 14:23:37.826000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcae6f8860 a2=74 a3=540051 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.826000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.827000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:23:37.827000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.827000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.827000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.827000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.827000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.827000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.827000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.827000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.827000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.827000 audit: BPF prog-id=146 op=LOAD Dec 13 14:23:37.827000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcae6f8890 a2=94 a3=2 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcae6f8760 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcae6f8790 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcae6f86a0 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcae6f87b0 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcae6f8790 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcae6f8780 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcae6f87b0 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcae6f8790 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcae6f87b0 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcae6f8780 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcae6f87f0 a2=28 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.829000 audit: BPF prog-id=147 op=LOAD Dec 13 14:23:37.829000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcae6f8660 a2=40 a3=0 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.830000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:23:37.830000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.830000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcae6f8650 a2=50 a3=2800 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcae6f8650 a2=50 a3=2800 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit: BPF prog-id=148 op=LOAD Dec 13 14:23:37.831000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcae6f7e70 a2=94 a3=2 items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.831000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.831000 audit: BPF prog-id=149 op=LOAD Dec 13 14:23:37.831000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcae6f7f70 a2=94 a3=2d items=0 ppid=3187 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:23:37.838000 audit[3275]: USER_END pid=3275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:37.838000 audit[3275]: CRED_DISP pid=3275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:37.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.66:22-10.0.0.1:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:37.835951 sshd[3275]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:37.850152 kubelet[1940]: E1213 14:23:37.837032 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:37.840573 systemd[1]: sshd@8-10.0.0.66:22-10.0.0.1:36714.service: Deactivated successfully. Dec 13 14:23:37.841514 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:23:37.845538 systemd-logind[1197]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:23:37.846796 systemd-logind[1197]: Removed session 9. Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit: BPF prog-id=150 op=LOAD Dec 13 14:23:37.850000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc05c33a50 a2=98 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.850000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:37.850000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.850000 audit: BPF prog-id=151 op=LOAD Dec 13 14:23:37.850000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc05c33830 a2=74 a3=540051 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.850000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:37.851000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:23:37.851000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.851000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.851000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.851000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.851000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.851000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.851000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.851000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.851000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.851000 audit: BPF prog-id=152 op=LOAD Dec 13 14:23:37.851000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc05c33860 a2=94 a3=2 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.851000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:37.851000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.829 [INFO][3332] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.829 [INFO][3332] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" iface="eth0" netns="/var/run/netns/cni-7dacc093-d224-fe24-2fb5-c68c7c4fcb56" Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.829 [INFO][3332] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" iface="eth0" netns="/var/run/netns/cni-7dacc093-d224-fe24-2fb5-c68c7c4fcb56" Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.829 [INFO][3332] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" iface="eth0" netns="/var/run/netns/cni-7dacc093-d224-fe24-2fb5-c68c7c4fcb56" Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.829 [INFO][3332] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.829 [INFO][3332] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.881 [INFO][3371] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" HandleID="k8s-pod-network.52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.882 [INFO][3371] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.882 [INFO][3371] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.890 [WARNING][3371] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" HandleID="k8s-pod-network.52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.890 [INFO][3371] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" HandleID="k8s-pod-network.52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.892 [INFO][3371] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:37.898723 env[1206]: 2024-12-13 14:23:37.896 [INFO][3332] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:37.899457 env[1206]: time="2024-12-13T14:23:37.899423000Z" level=info msg="TearDown network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\" successfully" Dec 13 14:23:37.899548 env[1206]: time="2024-12-13T14:23:37.899527438Z" level=info msg="StopPodSandbox for \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\" returns successfully" Dec 13 14:23:37.900823 env[1206]: time="2024-12-13T14:23:37.900767280Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d8bbbc697-k25fw,Uid:ff494c46-81af-4525-a624-22909b19eeb7,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit: BPF prog-id=153 op=LOAD Dec 13 14:23:37.984000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc05c33720 a2=40 a3=1 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.984000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:37.984000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:23:37.984000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.984000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc05c337f0 a2=50 a3=7ffc05c338d0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.984000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.001000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.001000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc05c33730 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc05c33760 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc05c33670 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc05c33780 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc05c33760 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc05c33750 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc05c33780 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc05c33760 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc05c33780 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc05c33750 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc05c337c0 a2=28 a3=0 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc05c33570 a2=50 a3=1 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit: BPF prog-id=154 op=LOAD Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc05c33570 a2=94 a3=5 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc05c33620 a2=50 a3=1 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc05c33740 a2=4 a3=38 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.002000 audit[3389]: AVC avc: denied { confidentiality } for pid=3389 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:38.002000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc05c33790 a2=94 a3=6 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { confidentiality } for pid=3389 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:38.003000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc05c32f40 a2=94 a3=83 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { confidentiality } for pid=3389 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:23:38.003000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc05c32f40 a2=94 a3=83 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc05c34980 a2=10 a3=208 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc05c34820 a2=10 a3=3 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc05c347c0 a2=10 a3=3 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.003000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.003000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc05c347c0 a2=10 a3=7 items=0 ppid=3187 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:23:38.012000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:23:38.089000 audit[3493]: NETFILTER_CFG table=raw:97 family=2 entries=21 op=nft_register_chain pid=3493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:38.089000 audit[3493]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcbf4d9e60 a2=0 a3=7ffcbf4d9e4c items=0 ppid=3187 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.089000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:38.091000 audit[3497]: NETFILTER_CFG table=mangle:98 family=2 entries=16 op=nft_register_chain pid=3497 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:38.091000 audit[3497]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd118b6480 a2=0 a3=7ffd118b646c items=0 ppid=3187 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.091000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:38.097000 audit[3496]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3496 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:38.097000 audit[3496]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffa0a2c1e0 a2=0 a3=7fffa0a2c1cc items=0 ppid=3187 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.097000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:38.098000 audit[3499]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:38.098000 audit[3499]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff75f59db0 a2=0 a3=7fff75f59d9c items=0 ppid=3187 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.098000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:38.116522 systemd-networkd[1026]: caliec601ee23b2: Link UP Dec 13 14:23:38.118422 systemd-networkd[1026]: caliec601ee23b2: Gained carrier Dec 13 14:23:38.118949 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec601ee23b2: link becomes ready Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:37.953 [INFO][3420] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0 calico-apiserver-6d8bbbc697- calico-apiserver 795f1f51-9efb-40d4-81a9-a5178b33107e 825 0 2024-12-13 14:23:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6d8bbbc697 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6d8bbbc697-bkcck eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliec601ee23b2 [] []}} ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-bkcck" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:37.953 [INFO][3420] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-bkcck" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.056 [INFO][3454] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" HandleID="k8s-pod-network.7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.072 [INFO][3454] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" HandleID="k8s-pod-network.7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000505550), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6d8bbbc697-bkcck", "timestamp":"2024-12-13 14:23:38.056185173 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.072 [INFO][3454] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.072 [INFO][3454] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.072 [INFO][3454] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.078 [INFO][3454] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" host="localhost" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.085 [INFO][3454] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.091 [INFO][3454] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.093 [INFO][3454] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.096 [INFO][3454] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.096 [INFO][3454] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" host="localhost" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.097 [INFO][3454] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4 Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.103 [INFO][3454] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" host="localhost" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.110 [INFO][3454] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" host="localhost" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.110 [INFO][3454] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" host="localhost" Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.110 [INFO][3454] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:38.133455 env[1206]: 2024-12-13 14:23:38.110 [INFO][3454] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" HandleID="k8s-pod-network.7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:38.134589 env[1206]: 2024-12-13 14:23:38.112 [INFO][3420] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-bkcck" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0", GenerateName:"calico-apiserver-6d8bbbc697-", Namespace:"calico-apiserver", SelfLink:"", UID:"795f1f51-9efb-40d4-81a9-a5178b33107e", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d8bbbc697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6d8bbbc697-bkcck", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliec601ee23b2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:38.134589 env[1206]: 2024-12-13 14:23:38.112 [INFO][3420] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-bkcck" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:38.134589 env[1206]: 2024-12-13 14:23:38.112 [INFO][3420] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliec601ee23b2 ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-bkcck" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:38.134589 env[1206]: 2024-12-13 14:23:38.119 [INFO][3420] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-bkcck" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:38.134589 env[1206]: 2024-12-13 14:23:38.119 [INFO][3420] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-bkcck" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0", GenerateName:"calico-apiserver-6d8bbbc697-", Namespace:"calico-apiserver", SelfLink:"", UID:"795f1f51-9efb-40d4-81a9-a5178b33107e", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d8bbbc697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4", Pod:"calico-apiserver-6d8bbbc697-bkcck", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliec601ee23b2", MAC:"9e:48:c8:d6:61:dd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:38.134589 env[1206]: 2024-12-13 14:23:38.131 [INFO][3420] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-bkcck" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:38.144000 audit[3523]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3523 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:38.144000 audit[3523]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffe5ded7810 a2=0 a3=7ffe5ded77fc items=0 ppid=3187 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.144000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:38.154397 env[1206]: time="2024-12-13T14:23:38.154304860Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:38.154397 env[1206]: time="2024-12-13T14:23:38.154353583Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:38.154397 env[1206]: time="2024-12-13T14:23:38.154364093Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:38.154547 env[1206]: time="2024-12-13T14:23:38.154505271Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4 pid=3532 runtime=io.containerd.runc.v2 Dec 13 14:23:38.166246 systemd[1]: Started cri-containerd-7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4.scope. Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.181000 audit: BPF prog-id=155 op=LOAD Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3532 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763326135323763666238393134373564306262373364626166323837 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3532 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763326135323763666238393134373564306262373364626166323837 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit: BPF prog-id=156 op=LOAD Dec 13 14:23:38.183000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d29d0 items=0 ppid=3532 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763326135323763666238393134373564306262373364626166323837 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit: BPF prog-id=157 op=LOAD Dec 13 14:23:38.183000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d2a18 items=0 ppid=3532 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763326135323763666238393134373564306262373364626166323837 Dec 13 14:23:38.183000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:23:38.183000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.183000 audit: BPF prog-id=158 op=LOAD Dec 13 14:23:38.183000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d2e28 items=0 ppid=3532 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763326135323763666238393134373564306262373364626166323837 Dec 13 14:23:38.185365 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:23:38.216307 env[1206]: time="2024-12-13T14:23:38.216216130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d8bbbc697-bkcck,Uid:795f1f51-9efb-40d4-81a9-a5178b33107e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4\"" Dec 13 14:23:38.217986 env[1206]: time="2024-12-13T14:23:38.217929089Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:23:38.222588 systemd-networkd[1026]: cali49764a3b671: Link UP Dec 13 14:23:38.223912 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali49764a3b671: link becomes ready Dec 13 14:23:38.223901 systemd-networkd[1026]: cali49764a3b671: Gained carrier Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:37.977 [INFO][3410] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--g6jxc-eth0 csi-node-driver- calico-system 35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2 824 0 2024-12-13 14:23:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-g6jxc eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali49764a3b671 [] []}} ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Namespace="calico-system" Pod="csi-node-driver-g6jxc" WorkloadEndpoint="localhost-k8s-csi--node--driver--g6jxc-" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:37.977 [INFO][3410] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Namespace="calico-system" Pod="csi-node-driver-g6jxc" WorkloadEndpoint="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.058 [INFO][3455] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" HandleID="k8s-pod-network.cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.077 [INFO][3455] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" HandleID="k8s-pod-network.cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000360bb0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-g6jxc", "timestamp":"2024-12-13 14:23:38.058833126 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.077 [INFO][3455] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.110 [INFO][3455] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.110 [INFO][3455] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.176 [INFO][3455] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" host="localhost" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.183 [INFO][3455] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.193 [INFO][3455] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.195 [INFO][3455] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.198 [INFO][3455] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.198 [INFO][3455] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" host="localhost" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.199 [INFO][3455] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33 Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.205 [INFO][3455] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" host="localhost" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.213 [INFO][3455] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" host="localhost" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.213 [INFO][3455] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" host="localhost" Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.213 [INFO][3455] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:38.239044 env[1206]: 2024-12-13 14:23:38.213 [INFO][3455] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" HandleID="k8s-pod-network.cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:38.239892 env[1206]: 2024-12-13 14:23:38.219 [INFO][3410] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Namespace="calico-system" Pod="csi-node-driver-g6jxc" WorkloadEndpoint="localhost-k8s-csi--node--driver--g6jxc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--g6jxc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-g6jxc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali49764a3b671", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:38.239892 env[1206]: 2024-12-13 14:23:38.219 [INFO][3410] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Namespace="calico-system" Pod="csi-node-driver-g6jxc" WorkloadEndpoint="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:38.239892 env[1206]: 2024-12-13 14:23:38.219 [INFO][3410] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali49764a3b671 ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Namespace="calico-system" Pod="csi-node-driver-g6jxc" WorkloadEndpoint="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:38.239892 env[1206]: 2024-12-13 14:23:38.224 [INFO][3410] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Namespace="calico-system" Pod="csi-node-driver-g6jxc" WorkloadEndpoint="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:38.239892 env[1206]: 2024-12-13 14:23:38.224 [INFO][3410] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Namespace="calico-system" Pod="csi-node-driver-g6jxc" WorkloadEndpoint="localhost-k8s-csi--node--driver--g6jxc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--g6jxc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33", Pod:"csi-node-driver-g6jxc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali49764a3b671", MAC:"56:ba:7e:f2:90:1b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:38.239892 env[1206]: 2024-12-13 14:23:38.236 [INFO][3410] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33" Namespace="calico-system" Pod="csi-node-driver-g6jxc" WorkloadEndpoint="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:38.256824 env[1206]: time="2024-12-13T14:23:38.256724556Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:38.256824 env[1206]: time="2024-12-13T14:23:38.256780111Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:38.257071 env[1206]: time="2024-12-13T14:23:38.256790321Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:38.257071 env[1206]: time="2024-12-13T14:23:38.256976314Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33 pid=3586 runtime=io.containerd.runc.v2 Dec 13 14:23:38.268510 systemd[1]: Started cri-containerd-cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33.scope. Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.283000 audit: BPF prog-id=159 op=LOAD Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3586 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613331393064373064653230316436353230633137303336626538 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3586 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613331393064373064653230316436353230633137303336626538 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.285000 audit: BPF prog-id=160 op=LOAD Dec 13 14:23:38.285000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030a6f0 items=0 ppid=3586 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613331393064373064653230316436353230633137303336626538 Dec 13 14:23:38.286000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.286000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.286000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.286000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.286000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.286000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.286000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.286000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.286000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.286000 audit: BPF prog-id=161 op=LOAD Dec 13 14:23:38.286000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030a738 items=0 ppid=3586 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613331393064373064653230316436353230633137303336626538 Dec 13 14:23:38.287000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:23:38.287000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.287000 audit: BPF prog-id=162 op=LOAD Dec 13 14:23:38.287000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030ab48 items=0 ppid=3586 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613331393064373064653230316436353230633137303336626538 Dec 13 14:23:38.290039 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:23:38.306241 env[1206]: time="2024-12-13T14:23:38.306192569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g6jxc,Uid:35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2,Namespace:calico-system,Attempt:1,} returns sandbox id \"cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33\"" Dec 13 14:23:38.310000 audit[3621]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3621 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:38.310000 audit[3621]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff912207f0 a2=0 a3=7fff912207dc items=0 ppid=3187 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.310000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:38.363046 systemd-networkd[1026]: cali7d0613defae: Link UP Dec 13 14:23:38.364945 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7d0613defae: link becomes ready Dec 13 14:23:38.364832 systemd-networkd[1026]: cali7d0613defae: Gained carrier Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.025 [INFO][3440] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0 calico-apiserver-6d8bbbc697- calico-apiserver ff494c46-81af-4525-a624-22909b19eeb7 829 0 2024-12-13 14:23:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6d8bbbc697 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6d8bbbc697-k25fw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7d0613defae [] []}} ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-k25fw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.025 [INFO][3440] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-k25fw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.081 [INFO][3475] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" HandleID="k8s-pod-network.b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.092 [INFO][3475] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" HandleID="k8s-pod-network.b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000307e90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6d8bbbc697-k25fw", "timestamp":"2024-12-13 14:23:38.081341316 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.094 [INFO][3475] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.214 [INFO][3475] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.214 [INFO][3475] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.276 [INFO][3475] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" host="localhost" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.283 [INFO][3475] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.296 [INFO][3475] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.300 [INFO][3475] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.303 [INFO][3475] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.303 [INFO][3475] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" host="localhost" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.309 [INFO][3475] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.351 [INFO][3475] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" host="localhost" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.358 [INFO][3475] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" host="localhost" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.359 [INFO][3475] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" host="localhost" Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.359 [INFO][3475] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:38.376449 env[1206]: 2024-12-13 14:23:38.359 [INFO][3475] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" HandleID="k8s-pod-network.b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:38.377323 env[1206]: 2024-12-13 14:23:38.361 [INFO][3440] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-k25fw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0", GenerateName:"calico-apiserver-6d8bbbc697-", Namespace:"calico-apiserver", SelfLink:"", UID:"ff494c46-81af-4525-a624-22909b19eeb7", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d8bbbc697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6d8bbbc697-k25fw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7d0613defae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:38.377323 env[1206]: 2024-12-13 14:23:38.361 [INFO][3440] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-k25fw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:38.377323 env[1206]: 2024-12-13 14:23:38.361 [INFO][3440] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7d0613defae ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-k25fw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:38.377323 env[1206]: 2024-12-13 14:23:38.364 [INFO][3440] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-k25fw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:38.377323 env[1206]: 2024-12-13 14:23:38.365 [INFO][3440] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-k25fw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0", GenerateName:"calico-apiserver-6d8bbbc697-", Namespace:"calico-apiserver", SelfLink:"", UID:"ff494c46-81af-4525-a624-22909b19eeb7", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d8bbbc697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f", Pod:"calico-apiserver-6d8bbbc697-k25fw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7d0613defae", MAC:"1e:92:47:0c:18:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:38.377323 env[1206]: 2024-12-13 14:23:38.375 [INFO][3440] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f" Namespace="calico-apiserver" Pod="calico-apiserver-6d8bbbc697-k25fw" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:38.392444 env[1206]: time="2024-12-13T14:23:38.392332271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:38.392444 env[1206]: time="2024-12-13T14:23:38.392388307Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:38.392444 env[1206]: time="2024-12-13T14:23:38.392402363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:38.392954 env[1206]: time="2024-12-13T14:23:38.392867446Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f pid=3640 runtime=io.containerd.runc.v2 Dec 13 14:23:38.406417 systemd[1]: Started cri-containerd-b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f.scope. Dec 13 14:23:38.419000 audit[3669]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3669 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:38.419000 audit[3669]: SYSCALL arch=c000003e syscall=46 success=yes exit=21516 a0=3 a1=7ffe0c61e210 a2=0 a3=7ffe0c61e1fc items=0 ppid=3187 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.419000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:38.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit: BPF prog-id=163 op=LOAD Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3640 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663316461306435303462343731306461353364613966656535 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3640 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663316461306435303462343731306461353364613966656535 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit: BPF prog-id=164 op=LOAD Dec 13 14:23:38.421000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030d070 items=0 ppid=3640 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663316461306435303462343731306461353364613966656535 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit: BPF prog-id=165 op=LOAD Dec 13 14:23:38.421000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030d0b8 items=0 ppid=3640 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663316461306435303462343731306461353364613966656535 Dec 13 14:23:38.421000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:23:38.421000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.421000 audit: BPF prog-id=166 op=LOAD Dec 13 14:23:38.421000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030d4c8 items=0 ppid=3640 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663316461306435303462343731306461353364613966656535 Dec 13 14:23:38.423363 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:23:38.445059 env[1206]: time="2024-12-13T14:23:38.445004923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d8bbbc697-k25fw,Uid:ff494c46-81af-4525-a624-22909b19eeb7,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f\"" Dec 13 14:23:38.660060 systemd[1]: run-netns-cni\x2d7dacc093\x2dd224\x2dfe24\x2d2fb5\x2dc68c7c4fcb56.mount: Deactivated successfully. Dec 13 14:23:39.690023 systemd-networkd[1026]: vxlan.calico: Gained IPv6LL Dec 13 14:23:39.720790 env[1206]: time="2024-12-13T14:23:39.720743656Z" level=info msg="StopPodSandbox for \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\"" Dec 13 14:23:39.721719 env[1206]: time="2024-12-13T14:23:39.720801246Z" level=info msg="StopPodSandbox for \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\"" Dec 13 14:23:39.818059 systemd-networkd[1026]: caliec601ee23b2: Gained IPv6LL Dec 13 14:23:39.882063 systemd-networkd[1026]: cali49764a3b671: Gained IPv6LL Dec 13 14:23:40.075014 systemd-networkd[1026]: cali7d0613defae: Gained IPv6LL Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.091 [INFO][3712] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.091 [INFO][3712] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" iface="eth0" netns="/var/run/netns/cni-469b57b2-9bda-aab9-0cb8-b3c771504388" Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.091 [INFO][3712] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" iface="eth0" netns="/var/run/netns/cni-469b57b2-9bda-aab9-0cb8-b3c771504388" Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.091 [INFO][3712] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" iface="eth0" netns="/var/run/netns/cni-469b57b2-9bda-aab9-0cb8-b3c771504388" Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.091 [INFO][3712] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.091 [INFO][3712] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.134 [INFO][3730] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" HandleID="k8s-pod-network.7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.134 [INFO][3730] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.134 [INFO][3730] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.147 [WARNING][3730] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" HandleID="k8s-pod-network.7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.148 [INFO][3730] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" HandleID="k8s-pod-network.7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.152 [INFO][3730] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:40.156186 env[1206]: 2024-12-13 14:23:40.154 [INFO][3712] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:40.159346 systemd[1]: run-netns-cni\x2d469b57b2\x2d9bda\x2daab9\x2d0cb8\x2db3c771504388.mount: Deactivated successfully. Dec 13 14:23:40.162285 env[1206]: time="2024-12-13T14:23:40.161224889Z" level=info msg="TearDown network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\" successfully" Dec 13 14:23:40.162285 env[1206]: time="2024-12-13T14:23:40.161263182Z" level=info msg="StopPodSandbox for \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\" returns successfully" Dec 13 14:23:40.162487 kubelet[1940]: E1213 14:23:40.161638 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:40.162817 env[1206]: time="2024-12-13T14:23:40.162555432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hcgzs,Uid:a0fe477f-17fd-4d57-900b-ffc23cea95e4,Namespace:kube-system,Attempt:1,}" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.092 [INFO][3722] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.092 [INFO][3722] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" iface="eth0" netns="/var/run/netns/cni-5f2db7a3-4644-9f7e-f725-e24afe9ea9fb" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.092 [INFO][3722] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" iface="eth0" netns="/var/run/netns/cni-5f2db7a3-4644-9f7e-f725-e24afe9ea9fb" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.093 [INFO][3722] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" iface="eth0" netns="/var/run/netns/cni-5f2db7a3-4644-9f7e-f725-e24afe9ea9fb" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.093 [INFO][3722] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.093 [INFO][3722] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.139 [INFO][3731] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" HandleID="k8s-pod-network.c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.140 [INFO][3731] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.152 [INFO][3731] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.165 [WARNING][3731] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" HandleID="k8s-pod-network.c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.165 [INFO][3731] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" HandleID="k8s-pod-network.c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.168 [INFO][3731] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:40.179001 env[1206]: 2024-12-13 14:23:40.175 [INFO][3722] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:40.182247 env[1206]: time="2024-12-13T14:23:40.182176701Z" level=info msg="TearDown network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\" successfully" Dec 13 14:23:40.182247 env[1206]: time="2024-12-13T14:23:40.182223460Z" level=info msg="StopPodSandbox for \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\" returns successfully" Dec 13 14:23:40.182674 kubelet[1940]: E1213 14:23:40.182644 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:40.182885 systemd[1]: run-netns-cni\x2d5f2db7a3\x2d4644\x2d9f7e\x2df725\x2de24afe9ea9fb.mount: Deactivated successfully. Dec 13 14:23:40.184156 env[1206]: time="2024-12-13T14:23:40.183122535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hkncl,Uid:0a5a6be7-8147-4be4-b939-7481abcb12ec,Namespace:kube-system,Attempt:1,}" Dec 13 14:23:40.390729 systemd-networkd[1026]: cali4193d30850f: Link UP Dec 13 14:23:40.394327 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:23:40.394418 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4193d30850f: link becomes ready Dec 13 14:23:40.394544 systemd-networkd[1026]: cali4193d30850f: Gained carrier Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.267 [INFO][3746] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0 coredns-6f6b679f8f- kube-system a0fe477f-17fd-4d57-900b-ffc23cea95e4 857 0 2024-12-13 14:23:02 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-hcgzs eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4193d30850f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Namespace="kube-system" Pod="coredns-6f6b679f8f-hcgzs" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hcgzs-" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.267 [INFO][3746] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Namespace="kube-system" Pod="coredns-6f6b679f8f-hcgzs" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.328 [INFO][3772] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" HandleID="k8s-pod-network.add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.344 [INFO][3772] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" HandleID="k8s-pod-network.add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000316d70), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-hcgzs", "timestamp":"2024-12-13 14:23:40.328718311 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.344 [INFO][3772] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.344 [INFO][3772] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.344 [INFO][3772] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.347 [INFO][3772] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" host="localhost" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.351 [INFO][3772] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.355 [INFO][3772] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.357 [INFO][3772] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.359 [INFO][3772] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.359 [INFO][3772] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" host="localhost" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.365 [INFO][3772] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3 Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.372 [INFO][3772] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" host="localhost" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.385 [INFO][3772] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" host="localhost" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.385 [INFO][3772] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" host="localhost" Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.385 [INFO][3772] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:40.411319 env[1206]: 2024-12-13 14:23:40.385 [INFO][3772] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" HandleID="k8s-pod-network.add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.412187 env[1206]: 2024-12-13 14:23:40.388 [INFO][3746] cni-plugin/k8s.go 386: Populated endpoint ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Namespace="kube-system" Pod="coredns-6f6b679f8f-hcgzs" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a0fe477f-17fd-4d57-900b-ffc23cea95e4", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-hcgzs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4193d30850f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:40.412187 env[1206]: 2024-12-13 14:23:40.388 [INFO][3746] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Namespace="kube-system" Pod="coredns-6f6b679f8f-hcgzs" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.412187 env[1206]: 2024-12-13 14:23:40.388 [INFO][3746] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4193d30850f ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Namespace="kube-system" Pod="coredns-6f6b679f8f-hcgzs" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.412187 env[1206]: 2024-12-13 14:23:40.395 [INFO][3746] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Namespace="kube-system" Pod="coredns-6f6b679f8f-hcgzs" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.412187 env[1206]: 2024-12-13 14:23:40.395 [INFO][3746] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Namespace="kube-system" Pod="coredns-6f6b679f8f-hcgzs" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a0fe477f-17fd-4d57-900b-ffc23cea95e4", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3", Pod:"coredns-6f6b679f8f-hcgzs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4193d30850f", MAC:"4e:ab:3b:b3:69:dc", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:40.412187 env[1206]: 2024-12-13 14:23:40.409 [INFO][3746] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3" Namespace="kube-system" Pod="coredns-6f6b679f8f-hcgzs" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:40.427000 audit[3803]: NETFILTER_CFG table=filter:104 family=2 entries=52 op=nft_register_chain pid=3803 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:40.427000 audit[3803]: SYSCALL arch=c000003e syscall=46 success=yes exit=25564 a0=3 a1=7fff9239cc50 a2=0 a3=7fff9239cc3c items=0 ppid=3187 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.427000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:40.440363 env[1206]: time="2024-12-13T14:23:40.440204701Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:40.440363 env[1206]: time="2024-12-13T14:23:40.440288921Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:40.440639 env[1206]: time="2024-12-13T14:23:40.440342743Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:40.440725 env[1206]: time="2024-12-13T14:23:40.440610582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3 pid=3810 runtime=io.containerd.runc.v2 Dec 13 14:23:40.462184 systemd[1]: Started cri-containerd-add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3.scope. Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.478000 audit: BPF prog-id=167 op=LOAD Dec 13 14:23:40.480000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.480000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643634313566623464383266623633313738393836646239366338 Dec 13 14:23:40.481000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.481000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643634313566623464383266623633313738393836646239366338 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.482000 audit: BPF prog-id=168 op=LOAD Dec 13 14:23:40.482000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00021c940 items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643634313566623464383266623633313738393836646239366338 Dec 13 14:23:40.484000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.484000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.484000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.484000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.484000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.484000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.484000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.484000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.484000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.484000 audit: BPF prog-id=169 op=LOAD Dec 13 14:23:40.484000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00021c988 items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643634313566623464383266623633313738393836646239366338 Dec 13 14:23:40.486000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:23:40.486000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.486000 audit: BPF prog-id=170 op=LOAD Dec 13 14:23:40.486000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00021cd98 items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643634313566623464383266623633313738393836646239366338 Dec 13 14:23:40.488988 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:23:40.503569 systemd-networkd[1026]: cali2116ed9e053: Link UP Dec 13 14:23:40.505941 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2116ed9e053: link becomes ready Dec 13 14:23:40.505739 systemd-networkd[1026]: cali2116ed9e053: Gained carrier Dec 13 14:23:40.520625 env[1206]: time="2024-12-13T14:23:40.520558614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hcgzs,Uid:a0fe477f-17fd-4d57-900b-ffc23cea95e4,Namespace:kube-system,Attempt:1,} returns sandbox id \"add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3\"" Dec 13 14:23:40.521422 kubelet[1940]: E1213 14:23:40.521395 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:40.524714 env[1206]: time="2024-12-13T14:23:40.524671293Z" level=info msg="CreateContainer within sandbox \"add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.330 [INFO][3761] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--hkncl-eth0 coredns-6f6b679f8f- kube-system 0a5a6be7-8147-4be4-b939-7481abcb12ec 858 0 2024-12-13 14:23:02 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-hkncl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2116ed9e053 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Namespace="kube-system" Pod="coredns-6f6b679f8f-hkncl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hkncl-" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.330 [INFO][3761] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Namespace="kube-system" Pod="coredns-6f6b679f8f-hkncl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.379 [INFO][3782] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" HandleID="k8s-pod-network.9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.442 [INFO][3782] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" HandleID="k8s-pod-network.9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ac200), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-hkncl", "timestamp":"2024-12-13 14:23:40.379163113 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.442 [INFO][3782] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.442 [INFO][3782] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.442 [INFO][3782] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.447 [INFO][3782] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" host="localhost" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.450 [INFO][3782] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.456 [INFO][3782] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.460 [INFO][3782] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.465 [INFO][3782] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.465 [INFO][3782] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" host="localhost" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.469 [INFO][3782] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5 Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.481 [INFO][3782] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" host="localhost" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.490 [INFO][3782] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" host="localhost" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.490 [INFO][3782] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" host="localhost" Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.490 [INFO][3782] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:40.524983 env[1206]: 2024-12-13 14:23:40.490 [INFO][3782] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" HandleID="k8s-pod-network.9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.525696 env[1206]: 2024-12-13 14:23:40.501 [INFO][3761] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Namespace="kube-system" Pod="coredns-6f6b679f8f-hkncl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hkncl-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0a5a6be7-8147-4be4-b939-7481abcb12ec", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-hkncl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2116ed9e053", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:40.525696 env[1206]: 2024-12-13 14:23:40.501 [INFO][3761] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Namespace="kube-system" Pod="coredns-6f6b679f8f-hkncl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.525696 env[1206]: 2024-12-13 14:23:40.501 [INFO][3761] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2116ed9e053 ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Namespace="kube-system" Pod="coredns-6f6b679f8f-hkncl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.525696 env[1206]: 2024-12-13 14:23:40.507 [INFO][3761] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Namespace="kube-system" Pod="coredns-6f6b679f8f-hkncl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.525696 env[1206]: 2024-12-13 14:23:40.507 [INFO][3761] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Namespace="kube-system" Pod="coredns-6f6b679f8f-hkncl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hkncl-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0a5a6be7-8147-4be4-b939-7481abcb12ec", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5", Pod:"coredns-6f6b679f8f-hkncl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2116ed9e053", MAC:"de:70:bd:04:50:db", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:40.525696 env[1206]: 2024-12-13 14:23:40.522 [INFO][3761] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5" Namespace="kube-system" Pod="coredns-6f6b679f8f-hkncl" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:40.534000 audit[3858]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=3858 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:40.534000 audit[3858]: SYSCALL arch=c000003e syscall=46 success=yes exit=19392 a0=3 a1=7ffc613ec7f0 a2=0 a3=7ffc613ec7dc items=0 ppid=3187 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.534000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:40.687254 env[1206]: time="2024-12-13T14:23:40.683471730Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:40.687254 env[1206]: time="2024-12-13T14:23:40.683589754Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:40.687254 env[1206]: time="2024-12-13T14:23:40.683603469Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:40.687254 env[1206]: time="2024-12-13T14:23:40.683808549Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5 pid=3868 runtime=io.containerd.runc.v2 Dec 13 14:23:40.698926 systemd[1]: Started cri-containerd-9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5.scope. Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.712000 audit: BPF prog-id=171 op=LOAD Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3868 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353965643036323438383738653538386261643639373930363538 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3868 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353965643036323438383738653538386261643639373930363538 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit: BPF prog-id=172 op=LOAD Dec 13 14:23:40.713000 audit[3878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001dfaf0 items=0 ppid=3868 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353965643036323438383738653538386261643639373930363538 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.713000 audit: BPF prog-id=173 op=LOAD Dec 13 14:23:40.713000 audit[3878]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001dfb38 items=0 ppid=3868 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353965643036323438383738653538386261643639373930363538 Dec 13 14:23:40.714000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:23:40.714000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.714000 audit: BPF prog-id=174 op=LOAD Dec 13 14:23:40.714000 audit[3878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001dff48 items=0 ppid=3868 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353965643036323438383738653538386261643639373930363538 Dec 13 14:23:40.716299 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:23:40.721708 env[1206]: time="2024-12-13T14:23:40.720981844Z" level=info msg="StopPodSandbox for \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\"" Dec 13 14:23:40.748127 env[1206]: time="2024-12-13T14:23:40.748079301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hkncl,Uid:0a5a6be7-8147-4be4-b939-7481abcb12ec,Namespace:kube-system,Attempt:1,} returns sandbox id \"9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5\"" Dec 13 14:23:40.749077 kubelet[1940]: E1213 14:23:40.748835 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:40.751043 env[1206]: time="2024-12-13T14:23:40.751002724Z" level=info msg="CreateContainer within sandbox \"9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:40.976 [INFO][3918] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:40.977 [INFO][3918] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" iface="eth0" netns="/var/run/netns/cni-915fdc03-be98-a14d-d1a8-ab8769859b8d" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:40.978 [INFO][3918] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" iface="eth0" netns="/var/run/netns/cni-915fdc03-be98-a14d-d1a8-ab8769859b8d" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:40.978 [INFO][3918] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" iface="eth0" netns="/var/run/netns/cni-915fdc03-be98-a14d-d1a8-ab8769859b8d" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:40.979 [INFO][3918] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:40.979 [INFO][3918] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:41.004 [INFO][3929] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" HandleID="k8s-pod-network.ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:41.047 [INFO][3929] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:41.047 [INFO][3929] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:41.053 [WARNING][3929] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" HandleID="k8s-pod-network.ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:41.053 [INFO][3929] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" HandleID="k8s-pod-network.ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:41.054 [INFO][3929] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:41.058703 env[1206]: 2024-12-13 14:23:41.056 [INFO][3918] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:41.059539 env[1206]: time="2024-12-13T14:23:41.059487934Z" level=info msg="TearDown network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\" successfully" Dec 13 14:23:41.059652 env[1206]: time="2024-12-13T14:23:41.059627389Z" level=info msg="StopPodSandbox for \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\" returns successfully" Dec 13 14:23:41.060449 env[1206]: time="2024-12-13T14:23:41.060426473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b9b6c69b5-qsx5x,Uid:1e7ff74d-aead-442a-8f68-a0517ddd74e7,Namespace:calico-system,Attempt:1,}" Dec 13 14:23:41.162327 systemd[1]: run-netns-cni\x2d915fdc03\x2dbe98\x2da14d\x2dd1a8\x2dab8769859b8d.mount: Deactivated successfully. Dec 13 14:23:41.578632 env[1206]: time="2024-12-13T14:23:41.578565308Z" level=info msg="CreateContainer within sandbox \"add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"38c63a1cd8c7ae2cad23f7363bf3efa73ebf5f77bc7deaa2fe858ba697ee928e\"" Dec 13 14:23:41.579303 env[1206]: time="2024-12-13T14:23:41.579269053Z" level=info msg="StartContainer for \"38c63a1cd8c7ae2cad23f7363bf3efa73ebf5f77bc7deaa2fe858ba697ee928e\"" Dec 13 14:23:41.600662 systemd[1]: Started cri-containerd-38c63a1cd8c7ae2cad23f7363bf3efa73ebf5f77bc7deaa2fe858ba697ee928e.scope. Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.625000 audit: BPF prog-id=175 op=LOAD Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3810 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633633613163643863376165326361643233663733363362663365 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3810 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633633613163643863376165326361643233663733363362663365 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.627000 audit: BPF prog-id=176 op=LOAD Dec 13 14:23:41.627000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000983b0 items=0 ppid=3810 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633633613163643863376165326361643233663733363362663365 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit: BPF prog-id=177 op=LOAD Dec 13 14:23:41.628000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000983f8 items=0 ppid=3810 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633633613163643863376165326361643233663733363362663365 Dec 13 14:23:41.628000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:23:41.628000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.628000 audit: BPF prog-id=178 op=LOAD Dec 13 14:23:41.628000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000098808 items=0 ppid=3810 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633633613163643863376165326361643233663733363362663365 Dec 13 14:23:41.637469 env[1206]: time="2024-12-13T14:23:41.637426273Z" level=info msg="CreateContainer within sandbox \"9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fcd17eddebc2e5341ff9c373025273b3a770e698644823b121c5f65f1e1d5121\"" Dec 13 14:23:41.638360 env[1206]: time="2024-12-13T14:23:41.638338513Z" level=info msg="StartContainer for \"fcd17eddebc2e5341ff9c373025273b3a770e698644823b121c5f65f1e1d5121\"" Dec 13 14:23:41.653800 env[1206]: time="2024-12-13T14:23:41.653745366Z" level=info msg="StartContainer for \"38c63a1cd8c7ae2cad23f7363bf3efa73ebf5f77bc7deaa2fe858ba697ee928e\" returns successfully" Dec 13 14:23:41.656285 env[1206]: time="2024-12-13T14:23:41.656257559Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:41.662561 systemd[1]: Started cri-containerd-fcd17eddebc2e5341ff9c373025273b3a770e698644823b121c5f65f1e1d5121.scope. Dec 13 14:23:41.663761 env[1206]: time="2024-12-13T14:23:41.663721581Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:41.665986 env[1206]: time="2024-12-13T14:23:41.665952262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:41.668629 env[1206]: time="2024-12-13T14:23:41.668601936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:41.669462 env[1206]: time="2024-12-13T14:23:41.668994600Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:23:41.671323 env[1206]: time="2024-12-13T14:23:41.671294601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:23:41.672165 env[1206]: time="2024-12-13T14:23:41.671887635Z" level=info msg="CreateContainer within sandbox \"7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.676000 audit: BPF prog-id=179 op=LOAD Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3868 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663643137656464656263326535333431666639633337333032353237 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3868 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663643137656464656263326535333431666639633337333032353237 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.677000 audit: BPF prog-id=180 op=LOAD Dec 13 14:23:41.677000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025420 items=0 ppid=3868 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663643137656464656263326535333431666639633337333032353237 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit: BPF prog-id=181 op=LOAD Dec 13 14:23:41.678000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025468 items=0 ppid=3868 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663643137656464656263326535333431666639633337333032353237 Dec 13 14:23:41.678000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:23:41.678000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:41.678000 audit: BPF prog-id=182 op=LOAD Dec 13 14:23:41.678000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025878 items=0 ppid=3868 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:41.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663643137656464656263326535333431666639633337333032353237 Dec 13 14:23:41.798485 env[1206]: time="2024-12-13T14:23:41.798403911Z" level=info msg="StartContainer for \"fcd17eddebc2e5341ff9c373025273b3a770e698644823b121c5f65f1e1d5121\" returns successfully" Dec 13 14:23:41.854883 kubelet[1940]: E1213 14:23:41.854838 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:41.857005 kubelet[1940]: E1213 14:23:41.856979 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:41.866008 systemd-networkd[1026]: cali4193d30850f: Gained IPv6LL Dec 13 14:23:42.047625 env[1206]: time="2024-12-13T14:23:42.047524271Z" level=info msg="CreateContainer within sandbox \"7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5ac981749d3992bef5525c18d2ed76d2a146e36bea1617566545efdd467e3c14\"" Dec 13 14:23:42.048218 env[1206]: time="2024-12-13T14:23:42.048180775Z" level=info msg="StartContainer for \"5ac981749d3992bef5525c18d2ed76d2a146e36bea1617566545efdd467e3c14\"" Dec 13 14:23:42.063164 systemd[1]: Started cri-containerd-5ac981749d3992bef5525c18d2ed76d2a146e36bea1617566545efdd467e3c14.scope. Dec 13 14:23:42.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit: BPF prog-id=183 op=LOAD Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3532 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633938313734396433393932626566353532356331386432656437 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3532 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633938313734396433393932626566353532356331386432656437 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.078000 audit: BPF prog-id=184 op=LOAD Dec 13 14:23:42.078000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00035e110 items=0 ppid=3532 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633938313734396433393932626566353532356331386432656437 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit: BPF prog-id=185 op=LOAD Dec 13 14:23:42.079000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00035e158 items=0 ppid=3532 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633938313734396433393932626566353532356331386432656437 Dec 13 14:23:42.079000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:23:42.079000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.079000 audit: BPF prog-id=186 op=LOAD Dec 13 14:23:42.079000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00035e568 items=0 ppid=3532 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633938313734396433393932626566353532356331386432656437 Dec 13 14:23:42.090679 systemd-networkd[1026]: cali8d5234ecb09: Link UP Dec 13 14:23:42.093186 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:23:42.093252 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8d5234ecb09: link becomes ready Dec 13 14:23:42.093284 systemd-networkd[1026]: cali8d5234ecb09: Gained carrier Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.686 [INFO][3958] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0 calico-kube-controllers-7b9b6c69b5- calico-system 1e7ff74d-aead-442a-8f68-a0517ddd74e7 875 0 2024-12-13 14:23:10 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7b9b6c69b5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7b9b6c69b5-qsx5x eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali8d5234ecb09 [] []}} ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Namespace="calico-system" Pod="calico-kube-controllers-7b9b6c69b5-qsx5x" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.686 [INFO][3958] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Namespace="calico-system" Pod="calico-kube-controllers-7b9b6c69b5-qsx5x" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.718 [INFO][4010] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" HandleID="k8s-pod-network.e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.758 [INFO][4010] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" HandleID="k8s-pod-network.e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003aa290), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7b9b6c69b5-qsx5x", "timestamp":"2024-12-13 14:23:41.718747816 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.758 [INFO][4010] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.758 [INFO][4010] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.758 [INFO][4010] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.760 [INFO][4010] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" host="localhost" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.765 [INFO][4010] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.769 [INFO][4010] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.772 [INFO][4010] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.774 [INFO][4010] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.774 [INFO][4010] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" host="localhost" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.776 [INFO][4010] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9 Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:41.808 [INFO][4010] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" host="localhost" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:42.084 [INFO][4010] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" host="localhost" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:42.084 [INFO][4010] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" host="localhost" Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:42.084 [INFO][4010] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:42.136233 env[1206]: 2024-12-13 14:23:42.084 [INFO][4010] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" HandleID="k8s-pod-network.e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:42.136881 env[1206]: 2024-12-13 14:23:42.089 [INFO][3958] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Namespace="calico-system" Pod="calico-kube-controllers-7b9b6c69b5-qsx5x" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0", GenerateName:"calico-kube-controllers-7b9b6c69b5-", Namespace:"calico-system", SelfLink:"", UID:"1e7ff74d-aead-442a-8f68-a0517ddd74e7", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b9b6c69b5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7b9b6c69b5-qsx5x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8d5234ecb09", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:42.136881 env[1206]: 2024-12-13 14:23:42.089 [INFO][3958] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Namespace="calico-system" Pod="calico-kube-controllers-7b9b6c69b5-qsx5x" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:42.136881 env[1206]: 2024-12-13 14:23:42.089 [INFO][3958] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8d5234ecb09 ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Namespace="calico-system" Pod="calico-kube-controllers-7b9b6c69b5-qsx5x" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:42.136881 env[1206]: 2024-12-13 14:23:42.090 [INFO][3958] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Namespace="calico-system" Pod="calico-kube-controllers-7b9b6c69b5-qsx5x" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:42.136881 env[1206]: 2024-12-13 14:23:42.093 [INFO][3958] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Namespace="calico-system" Pod="calico-kube-controllers-7b9b6c69b5-qsx5x" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0", GenerateName:"calico-kube-controllers-7b9b6c69b5-", Namespace:"calico-system", SelfLink:"", UID:"1e7ff74d-aead-442a-8f68-a0517ddd74e7", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b9b6c69b5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9", Pod:"calico-kube-controllers-7b9b6c69b5-qsx5x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8d5234ecb09", MAC:"fe:a5:c7:56:a2:e3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:42.136881 env[1206]: 2024-12-13 14:23:42.134 [INFO][3958] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9" Namespace="calico-system" Pod="calico-kube-controllers-7b9b6c69b5-qsx5x" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:42.162459 kubelet[1940]: I1213 14:23:42.162396 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-hkncl" podStartSLOduration=40.162377119 podStartE2EDuration="40.162377119s" podCreationTimestamp="2024-12-13 14:23:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:42.133771879 +0000 UTC m=+46.497768611" watchObservedRunningTime="2024-12-13 14:23:42.162377119 +0000 UTC m=+46.526373851" Dec 13 14:23:42.177000 audit[4079]: NETFILTER_CFG table=filter:106 family=2 entries=46 op=nft_register_chain pid=4079 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:23:42.177000 audit[4079]: SYSCALL arch=c000003e syscall=46 success=yes exit=22188 a0=3 a1=7ffd315c8d40 a2=0 a3=7ffd315c8d2c items=0 ppid=3187 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.177000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:23:42.250064 systemd-networkd[1026]: cali2116ed9e053: Gained IPv6LL Dec 13 14:23:42.322766 env[1206]: time="2024-12-13T14:23:42.322712223Z" level=info msg="StartContainer for \"5ac981749d3992bef5525c18d2ed76d2a146e36bea1617566545efdd467e3c14\" returns successfully" Dec 13 14:23:42.361000 audit[4085]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:42.361000 audit[4085]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffbc1787e0 a2=0 a3=7fffbc1787cc items=0 ppid=2100 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.361000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:42.371000 audit[4085]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:42.371000 audit[4085]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffbc1787e0 a2=0 a3=0 items=0 ppid=2100 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:42.547000 env[1206]: time="2024-12-13T14:23:42.546149816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:42.547000 env[1206]: time="2024-12-13T14:23:42.546204870Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:42.547000 env[1206]: time="2024-12-13T14:23:42.546219227Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:42.547000 env[1206]: time="2024-12-13T14:23:42.546444445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9 pid=4095 runtime=io.containerd.runc.v2 Dec 13 14:23:42.568852 systemd[1]: run-containerd-runc-k8s.io-e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9-runc.s7sisa.mount: Deactivated successfully. Dec 13 14:23:42.575383 systemd[1]: Started cri-containerd-e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9.scope. Dec 13 14:23:42.591891 kernel: kauditd_printk_skb: 996 callbacks suppressed Dec 13 14:23:42.592044 kernel: audit: type=1400 audit(1734099822.585:1263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595720 kernel: audit: type=1400 audit(1734099822.585:1264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595759 kernel: audit: type=1400 audit(1734099822.585:1265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601861 kernel: audit: type=1400 audit(1734099822.585:1266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.608819 kernel: audit: type=1400 audit(1734099822.585:1267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.608893 kernel: audit: type=1400 audit(1734099822.585:1268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.609608 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.624597 kernel: audit: type=1400 audit(1734099822.585:1269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.624666 kernel: audit: type=1400 audit(1734099822.585:1270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.624690 kernel: audit: type=1400 audit(1734099822.585:1271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.627674 kernel: audit: type=1400 audit(1734099822.585:1272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.585000 audit: BPF prog-id=187 op=LOAD Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4095 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235336366346636393166643533386666613931623961656535 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=4095 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235336366346636393166643533386666613931623961656535 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.595000 audit: BPF prog-id=188 op=LOAD Dec 13 14:23:42.595000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0002d7ec0 items=0 ppid=4095 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235336366346636393166643533386666613931623961656535 Dec 13 14:23:42.598000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.598000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.598000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.598000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.598000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.598000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.598000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.598000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.598000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.598000 audit: BPF prog-id=189 op=LOAD Dec 13 14:23:42.598000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0002d7f08 items=0 ppid=4095 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235336366346636393166643533386666613931623961656535 Dec 13 14:23:42.601000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:23:42.601000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:42.601000 audit: BPF prog-id=190 op=LOAD Dec 13 14:23:42.601000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003ca318 items=0 ppid=4095 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656235336366346636393166643533386666613931623961656535 Dec 13 14:23:42.656871 env[1206]: time="2024-12-13T14:23:42.656803413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b9b6c69b5-qsx5x,Uid:1e7ff74d-aead-442a-8f68-a0517ddd74e7,Namespace:calico-system,Attempt:1,} returns sandbox id \"e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9\"" Dec 13 14:23:42.716000 audit[4131]: NETFILTER_CFG table=filter:109 family=2 entries=16 op=nft_register_rule pid=4131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:42.716000 audit[4131]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd5e2f8140 a2=0 a3=7ffd5e2f812c items=0 ppid=2100 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:42.721000 audit[4131]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=4131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:42.721000 audit[4131]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd5e2f8140 a2=0 a3=0 items=0 ppid=2100 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.721000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:42.840563 systemd[1]: Started sshd@9-10.0.0.66:22-10.0.0.1:34192.service. Dec 13 14:23:42.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.66:22-10.0.0.1:34192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:42.862158 kubelet[1940]: E1213 14:23:42.862115 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:42.863584 kubelet[1940]: E1213 14:23:42.862755 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:42.909000 audit[4133]: USER_ACCT pid=4133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:42.910709 sshd[4133]: Accepted publickey for core from 10.0.0.1 port 34192 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:23:42.910000 audit[4133]: CRED_ACQ pid=4133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:42.910000 audit[4133]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe991662f0 a2=3 a3=0 items=0 ppid=1 pid=4133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:42.910000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:42.911924 sshd[4133]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:42.916240 systemd-logind[1197]: New session 10 of user core. Dec 13 14:23:42.917292 systemd[1]: Started session-10.scope. Dec 13 14:23:42.922000 audit[4133]: USER_START pid=4133 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:42.923000 audit[4135]: CRED_ACQ pid=4135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:42.980235 kubelet[1940]: I1213 14:23:42.980145 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-hcgzs" podStartSLOduration=40.98010023 podStartE2EDuration="40.98010023s" podCreationTimestamp="2024-12-13 14:23:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:42.561421589 +0000 UTC m=+46.925418321" watchObservedRunningTime="2024-12-13 14:23:42.98010023 +0000 UTC m=+47.344096952" Dec 13 14:23:43.119559 sshd[4133]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:43.119000 audit[4133]: USER_END pid=4133 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:43.119000 audit[4133]: CRED_DISP pid=4133 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:43.122183 systemd[1]: sshd@9-10.0.0.66:22-10.0.0.1:34192.service: Deactivated successfully. Dec 13 14:23:43.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.66:22-10.0.0.1:34192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:43.122966 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:23:43.123612 systemd-logind[1197]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:23:43.124432 systemd-logind[1197]: Removed session 10. Dec 13 14:23:43.288438 kubelet[1940]: I1213 14:23:43.288367 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6d8bbbc697-bkcck" podStartSLOduration=30.835141499 podStartE2EDuration="34.288341628s" podCreationTimestamp="2024-12-13 14:23:09 +0000 UTC" firstStartedPulling="2024-12-13 14:23:38.217346934 +0000 UTC m=+42.581343666" lastFinishedPulling="2024-12-13 14:23:41.670547063 +0000 UTC m=+46.034543795" observedRunningTime="2024-12-13 14:23:42.980667716 +0000 UTC m=+47.344664438" watchObservedRunningTime="2024-12-13 14:23:43.288341628 +0000 UTC m=+47.652338361" Dec 13 14:23:43.402064 systemd-networkd[1026]: cali8d5234ecb09: Gained IPv6LL Dec 13 14:23:43.410000 audit[4153]: NETFILTER_CFG table=filter:111 family=2 entries=13 op=nft_register_rule pid=4153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:43.410000 audit[4153]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd50b42c40 a2=0 a3=7ffd50b42c2c items=0 ppid=2100 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:43.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:43.425000 audit[4153]: NETFILTER_CFG table=nat:112 family=2 entries=35 op=nft_register_chain pid=4153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:43.425000 audit[4153]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd50b42c40 a2=0 a3=7ffd50b42c2c items=0 ppid=2100 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:43.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:43.860000 audit[4045]: AVC avc: denied { watch } for pid=4045 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_23_24.3528734736/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c132,c598 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c132,c598 tclass=file permissive=0 Dec 13 14:23:43.860000 audit[4045]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b52780 a2=fc6 a3=0 items=0 ppid=3532 pid=4045 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c132,c598 key=(null) Dec 13 14:23:43.860000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:23:43.863626 kubelet[1940]: E1213 14:23:43.863601 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:43.864015 kubelet[1940]: E1213 14:23:43.863601 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:43.864015 kubelet[1940]: I1213 14:23:43.864017 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:23:44.295666 env[1206]: time="2024-12-13T14:23:44.295532934Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:44.297864 env[1206]: time="2024-12-13T14:23:44.297819076Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:44.301757 env[1206]: time="2024-12-13T14:23:44.301715571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:44.303177 env[1206]: time="2024-12-13T14:23:44.303143308Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:44.303688 env[1206]: time="2024-12-13T14:23:44.303653174Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:23:44.304872 env[1206]: time="2024-12-13T14:23:44.304810808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:23:44.305894 env[1206]: time="2024-12-13T14:23:44.305864865Z" level=info msg="CreateContainer within sandbox \"cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:23:44.323328 env[1206]: time="2024-12-13T14:23:44.323273660Z" level=info msg="CreateContainer within sandbox \"cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"10daae6de6f0f721192bbbb84a28203709b9441bf6d4af1f999a7c8b8c23ee4e\"" Dec 13 14:23:44.324042 env[1206]: time="2024-12-13T14:23:44.323997872Z" level=info msg="StartContainer for \"10daae6de6f0f721192bbbb84a28203709b9441bf6d4af1f999a7c8b8c23ee4e\"" Dec 13 14:23:44.347145 systemd[1]: run-containerd-runc-k8s.io-10daae6de6f0f721192bbbb84a28203709b9441bf6d4af1f999a7c8b8c23ee4e-runc.UMJHx4.mount: Deactivated successfully. Dec 13 14:23:44.352980 systemd[1]: Started cri-containerd-10daae6de6f0f721192bbbb84a28203709b9441bf6d4af1f999a7c8b8c23ee4e.scope. Dec 13 14:23:44.364000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.364000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6a8014bba8 items=0 ppid=3586 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130646161653664653666306637323131393262626262383461323832 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit: BPF prog-id=191 op=LOAD Dec 13 14:23:44.365000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00038e8a8 items=0 ppid=3586 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130646161653664653666306637323131393262626262383461323832 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit: BPF prog-id=192 op=LOAD Dec 13 14:23:44.365000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00038e8f8 items=0 ppid=3586 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130646161653664653666306637323131393262626262383461323832 Dec 13 14:23:44.365000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:23:44.365000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.365000 audit: BPF prog-id=193 op=LOAD Dec 13 14:23:44.365000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00038e988 items=0 ppid=3586 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130646161653664653666306637323131393262626262383461323832 Dec 13 14:23:44.437921 env[1206]: time="2024-12-13T14:23:44.437797666Z" level=info msg="StartContainer for \"10daae6de6f0f721192bbbb84a28203709b9441bf6d4af1f999a7c8b8c23ee4e\" returns successfully" Dec 13 14:23:44.463000 audit[4191]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:44.463000 audit[4191]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc38ed7100 a2=0 a3=7ffc38ed70ec items=0 ppid=2100 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:44.482000 audit[4191]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:44.482000 audit[4191]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc38ed7100 a2=0 a3=7ffc38ed70ec items=0 ppid=2100 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:44.680821 env[1206]: time="2024-12-13T14:23:44.680767495Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:44.683385 env[1206]: time="2024-12-13T14:23:44.683360508Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:44.685557 env[1206]: time="2024-12-13T14:23:44.685484575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:44.688138 env[1206]: time="2024-12-13T14:23:44.688111703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:44.688737 env[1206]: time="2024-12-13T14:23:44.688701331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:23:44.690196 env[1206]: time="2024-12-13T14:23:44.690161208Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:23:44.691310 env[1206]: time="2024-12-13T14:23:44.691276311Z" level=info msg="CreateContainer within sandbox \"b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:23:44.774047 env[1206]: time="2024-12-13T14:23:44.773975631Z" level=info msg="CreateContainer within sandbox \"b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f948bcefea5ea7ff6a7acc5fe42e1abe4e36c05aa011cb00888676038f019219\"" Dec 13 14:23:44.774705 env[1206]: time="2024-12-13T14:23:44.774664887Z" level=info msg="StartContainer for \"f948bcefea5ea7ff6a7acc5fe42e1abe4e36c05aa011cb00888676038f019219\"" Dec 13 14:23:44.790000 systemd[1]: Started cri-containerd-f948bcefea5ea7ff6a7acc5fe42e1abe4e36c05aa011cb00888676038f019219.scope. Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.805000 audit: BPF prog-id=194 op=LOAD Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3640 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343862636566656135656137666636613761636335666534326531 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3640 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343862636566656135656137666636613761636335666534326531 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit: BPF prog-id=195 op=LOAD Dec 13 14:23:44.806000 audit[4201]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024b10 items=0 ppid=3640 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343862636566656135656137666636613761636335666534326531 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit: BPF prog-id=196 op=LOAD Dec 13 14:23:44.806000 audit[4201]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024b58 items=0 ppid=3640 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343862636566656135656137666636613761636335666534326531 Dec 13 14:23:44.806000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:23:44.806000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { perfmon } for pid=4201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit[4201]: AVC avc: denied { bpf } for pid=4201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:44.806000 audit: BPF prog-id=197 op=LOAD Dec 13 14:23:44.806000 audit[4201]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024f68 items=0 ppid=3640 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:44.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343862636566656135656137666636613761636335666534326531 Dec 13 14:23:44.835582 env[1206]: time="2024-12-13T14:23:44.835534652Z" level=info msg="StartContainer for \"f948bcefea5ea7ff6a7acc5fe42e1abe4e36c05aa011cb00888676038f019219\" returns successfully" Dec 13 14:23:44.875035 kubelet[1940]: E1213 14:23:44.874073 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:45.496000 audit[4233]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:45.496000 audit[4233]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffccc0bd420 a2=0 a3=7ffccc0bd40c items=0 ppid=2100 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:45.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:45.505000 audit[4233]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:45.505000 audit[4233]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffccc0bd420 a2=0 a3=7ffccc0bd40c items=0 ppid=2100 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:45.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:45.664000 audit[4212]: AVC avc: denied { watch } for pid=4212 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_23_24.1675901024/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c991 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c359,c991 tclass=file permissive=0 Dec 13 14:23:45.664000 audit[4212]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0012d6640 a2=fc6 a3=0 items=0 ppid=3640 pid=4212 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c991 key=(null) Dec 13 14:23:45.664000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:23:45.875727 kubelet[1940]: I1213 14:23:45.875689 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:23:48.132166 kernel: kauditd_printk_skb: 188 callbacks suppressed Dec 13 14:23:48.132301 kernel: audit: type=1130 audit(1734099828.123:1324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.66:22-10.0.0.1:45040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:48.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.66:22-10.0.0.1:45040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:48.123718 systemd[1]: Started sshd@10-10.0.0.66:22-10.0.0.1:45040.service. Dec 13 14:23:48.162000 audit[4243]: USER_ACCT pid=4243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.177015 kernel: audit: type=1101 audit(1734099828.162:1325): pid=4243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.177058 sshd[4243]: Accepted publickey for core from 10.0.0.1 port 45040 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:23:48.176000 audit[4243]: CRED_ACQ pid=4243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.181880 kernel: audit: type=1103 audit(1734099828.176:1326): pid=4243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.177405 sshd[4243]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:48.184997 kernel: audit: type=1006 audit(1734099828.176:1327): pid=4243 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:23:48.194588 kernel: audit: type=1300 audit(1734099828.176:1327): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe346fdce0 a2=3 a3=0 items=0 ppid=1 pid=4243 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:48.176000 audit[4243]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe346fdce0 a2=3 a3=0 items=0 ppid=1 pid=4243 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:48.182236 systemd[1]: Started session-11.scope. Dec 13 14:23:48.182734 systemd-logind[1197]: New session 11 of user core. Dec 13 14:23:48.176000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:48.200715 kernel: audit: type=1327 audit(1734099828.176:1327): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:48.200748 kernel: audit: type=1105 audit(1734099828.186:1328): pid=4243 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.186000 audit[4243]: USER_START pid=4243 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.218283 kernel: audit: type=1103 audit(1734099828.187:1329): pid=4245 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.187000 audit[4245]: CRED_ACQ pid=4245 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.407259 sshd[4243]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:48.408000 audit[4243]: USER_END pid=4243 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.410281 systemd[1]: sshd@10-10.0.0.66:22-10.0.0.1:45040.service: Deactivated successfully. Dec 13 14:23:48.411077 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:23:48.408000 audit[4243]: CRED_DISP pid=4243 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.425738 systemd-logind[1197]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:23:48.426646 systemd-logind[1197]: Removed session 11. Dec 13 14:23:48.428944 kernel: audit: type=1106 audit(1734099828.408:1330): pid=4243 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.429044 kernel: audit: type=1104 audit(1734099828.408:1331): pid=4243 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:48.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.66:22-10.0.0.1:45040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:49.645513 env[1206]: time="2024-12-13T14:23:49.645427388Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:49.658540 env[1206]: time="2024-12-13T14:23:49.658447962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:49.690043 env[1206]: time="2024-12-13T14:23:49.689953683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:49.741332 env[1206]: time="2024-12-13T14:23:49.741249680Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:49.741995 env[1206]: time="2024-12-13T14:23:49.741962611Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:23:49.743339 env[1206]: time="2024-12-13T14:23:49.743272262Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:23:49.753023 env[1206]: time="2024-12-13T14:23:49.752972597Z" level=info msg="CreateContainer within sandbox \"e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:23:49.828991 env[1206]: time="2024-12-13T14:23:49.828924119Z" level=info msg="CreateContainer within sandbox \"e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1ef7e43b469bb1155e5032497d866748ab72a0e2b13ed68283679e4a0ed69220\"" Dec 13 14:23:49.829587 env[1206]: time="2024-12-13T14:23:49.829562899Z" level=info msg="StartContainer for \"1ef7e43b469bb1155e5032497d866748ab72a0e2b13ed68283679e4a0ed69220\"" Dec 13 14:23:49.846757 systemd[1]: Started cri-containerd-1ef7e43b469bb1155e5032497d866748ab72a0e2b13ed68283679e4a0ed69220.scope. Dec 13 14:23:49.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit: BPF prog-id=198 op=LOAD Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4095 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663765343362343639626231313535653530333234393764383636 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4095 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663765343362343639626231313535653530333234393764383636 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.859000 audit: BPF prog-id=199 op=LOAD Dec 13 14:23:49.859000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025b70 items=0 ppid=4095 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663765343362343639626231313535653530333234393764383636 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit: BPF prog-id=200 op=LOAD Dec 13 14:23:49.860000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025bb8 items=0 ppid=4095 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663765343362343639626231313535653530333234393764383636 Dec 13 14:23:49.860000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:23:49.860000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.860000 audit: BPF prog-id=201 op=LOAD Dec 13 14:23:49.860000 audit[4267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025fc8 items=0 ppid=4095 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663765343362343639626231313535653530333234393764383636 Dec 13 14:23:49.893058 env[1206]: time="2024-12-13T14:23:49.892988142Z" level=info msg="StartContainer for \"1ef7e43b469bb1155e5032497d866748ab72a0e2b13ed68283679e4a0ed69220\" returns successfully" Dec 13 14:23:50.935022 kubelet[1940]: I1213 14:23:50.934461 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6d8bbbc697-k25fw" podStartSLOduration=35.691095477 podStartE2EDuration="41.934442692s" podCreationTimestamp="2024-12-13 14:23:09 +0000 UTC" firstStartedPulling="2024-12-13 14:23:38.446339274 +0000 UTC m=+42.810336006" lastFinishedPulling="2024-12-13 14:23:44.689686488 +0000 UTC m=+49.053683221" observedRunningTime="2024-12-13 14:23:44.884598332 +0000 UTC m=+49.248595054" watchObservedRunningTime="2024-12-13 14:23:50.934442692 +0000 UTC m=+55.298439424" Dec 13 14:23:50.935022 kubelet[1940]: I1213 14:23:50.934716 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7b9b6c69b5-qsx5x" podStartSLOduration=33.852190958 podStartE2EDuration="40.934709267s" podCreationTimestamp="2024-12-13 14:23:10 +0000 UTC" firstStartedPulling="2024-12-13 14:23:42.660517364 +0000 UTC m=+47.024514096" lastFinishedPulling="2024-12-13 14:23:49.743035653 +0000 UTC m=+54.107032405" observedRunningTime="2024-12-13 14:23:50.934227434 +0000 UTC m=+55.298224166" watchObservedRunningTime="2024-12-13 14:23:50.934709267 +0000 UTC m=+55.298705999" Dec 13 14:23:51.908000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:51.908000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:51.908000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b5d0c0 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:23:51.908000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001289830 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:23:51.908000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:51.908000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:52.439000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:52.439000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c005dc1e20 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:23:52.439000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:52.439000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:52.439000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0093e9e00 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:23:52.439000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:52.439000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:52.439000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0049c5020 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:23:52.439000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:52.440000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:52.440000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00997c7b0 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:23:52.440000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:52.440000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:52.440000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00997c7e0 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:23:52.440000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:52.448000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:52.448000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0095df950 a2=fc6 a3=0 items=0 ppid=1666 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c486,c525 key=(null) Dec 13 14:23:52.448000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:52.505209 kubelet[1940]: E1213 14:23:52.505164 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:52.672441 env[1206]: time="2024-12-13T14:23:52.672352800Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:52.679859 env[1206]: time="2024-12-13T14:23:52.679768824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:52.685911 env[1206]: time="2024-12-13T14:23:52.685826647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:52.687802 env[1206]: time="2024-12-13T14:23:52.687763063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:52.688416 env[1206]: time="2024-12-13T14:23:52.688318115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:23:52.690904 env[1206]: time="2024-12-13T14:23:52.690730393Z" level=info msg="CreateContainer within sandbox \"cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:23:52.708973 env[1206]: time="2024-12-13T14:23:52.708917836Z" level=info msg="CreateContainer within sandbox \"cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"be8101185b4c626f3e68dc4d68386e060d7d6064076f4c0c1251b6672272e90f\"" Dec 13 14:23:52.709620 env[1206]: time="2024-12-13T14:23:52.709583206Z" level=info msg="StartContainer for \"be8101185b4c626f3e68dc4d68386e060d7d6064076f4c0c1251b6672272e90f\"" Dec 13 14:23:52.730107 systemd[1]: Started cri-containerd-be8101185b4c626f3e68dc4d68386e060d7d6064076f4c0c1251b6672272e90f.scope. Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f67b8febcc8 items=0 ppid=3586 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:52.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383130313138356234633632366633653638646334643638333836 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit: BPF prog-id=202 op=LOAD Dec 13 14:23:52.742000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c000305138 items=0 ppid=3586 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:52.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383130313138356234633632366633653638646334643638333836 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit: BPF prog-id=203 op=LOAD Dec 13 14:23:52.742000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c000305188 items=0 ppid=3586 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:52.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383130313138356234633632366633653638646334643638333836 Dec 13 14:23:52.742000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:23:52.742000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:52.742000 audit: BPF prog-id=204 op=LOAD Dec 13 14:23:52.742000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c000305218 items=0 ppid=3586 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:52.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383130313138356234633632366633653638646334643638333836 Dec 13 14:23:52.805015 env[1206]: time="2024-12-13T14:23:52.804951533Z" level=info msg="StartContainer for \"be8101185b4c626f3e68dc4d68386e060d7d6064076f4c0c1251b6672272e90f\" returns successfully" Dec 13 14:23:52.910957 kubelet[1940]: I1213 14:23:52.910831 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-g6jxc" podStartSLOduration=28.529204601 podStartE2EDuration="42.910809085s" podCreationTimestamp="2024-12-13 14:23:10 +0000 UTC" firstStartedPulling="2024-12-13 14:23:38.307611992 +0000 UTC m=+42.671608724" lastFinishedPulling="2024-12-13 14:23:52.689216476 +0000 UTC m=+57.053213208" observedRunningTime="2024-12-13 14:23:52.910596813 +0000 UTC m=+57.274593565" watchObservedRunningTime="2024-12-13 14:23:52.910809085 +0000 UTC m=+57.274805817" Dec 13 14:23:53.268415 systemd[1]: run-containerd-runc-k8s.io-be8101185b4c626f3e68dc4d68386e060d7d6064076f4c0c1251b6672272e90f-runc.k5GKyS.mount: Deactivated successfully. Dec 13 14:23:53.411861 systemd[1]: Started sshd@11-10.0.0.66:22-10.0.0.1:45044.service. Dec 13 14:23:53.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.66:22-10.0.0.1:45044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:53.413617 kernel: kauditd_printk_skb: 125 callbacks suppressed Dec 13 14:23:53.413690 kernel: audit: type=1130 audit(1734099833.411:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.66:22-10.0.0.1:45044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:53.453000 audit[4381]: USER_ACCT pid=4381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.454675 sshd[4381]: Accepted publickey for core from 10.0.0.1 port 45044 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:23:53.456425 sshd[4381]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:53.455000 audit[4381]: CRED_ACQ pid=4381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.459893 systemd-logind[1197]: New session 12 of user core. Dec 13 14:23:53.460756 systemd[1]: Started session-12.scope. Dec 13 14:23:53.463303 kernel: audit: type=1101 audit(1734099833.453:1366): pid=4381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.463354 kernel: audit: type=1103 audit(1734099833.455:1367): pid=4381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.463371 kernel: audit: type=1006 audit(1734099833.455:1368): pid=4381 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:23:53.455000 audit[4381]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c58cf50 a2=3 a3=0 items=0 ppid=1 pid=4381 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:53.471355 kernel: audit: type=1300 audit(1734099833.455:1368): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c58cf50 a2=3 a3=0 items=0 ppid=1 pid=4381 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:53.471416 kernel: audit: type=1327 audit(1734099833.455:1368): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:53.455000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:53.463000 audit[4381]: USER_START pid=4381 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.478631 kernel: audit: type=1105 audit(1734099833.463:1369): pid=4381 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.478681 kernel: audit: type=1103 audit(1734099833.464:1370): pid=4383 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.464000 audit[4383]: CRED_ACQ pid=4383 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.655636 sshd[4381]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:53.655000 audit[4381]: USER_END pid=4381 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.659321 systemd[1]: sshd@11-10.0.0.66:22-10.0.0.1:45044.service: Deactivated successfully. Dec 13 14:23:53.659835 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:23:53.660455 systemd-logind[1197]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:23:53.661446 systemd[1]: Started sshd@12-10.0.0.66:22-10.0.0.1:45048.service. Dec 13 14:23:53.655000 audit[4381]: CRED_DISP pid=4381 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.662805 systemd-logind[1197]: Removed session 12. Dec 13 14:23:53.666029 kernel: audit: type=1106 audit(1734099833.655:1371): pid=4381 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.666089 kernel: audit: type=1104 audit(1734099833.655:1372): pid=4381 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.66:22-10.0.0.1:45044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:53.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.66:22-10.0.0.1:45048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:53.697313 sshd[4397]: Accepted publickey for core from 10.0.0.1 port 45048 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:23:53.696000 audit[4397]: USER_ACCT pid=4397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.697000 audit[4397]: CRED_ACQ pid=4397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.697000 audit[4397]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1b26b3d0 a2=3 a3=0 items=0 ppid=1 pid=4397 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:53.697000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:53.698912 sshd[4397]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:53.702592 systemd-logind[1197]: New session 13 of user core. Dec 13 14:23:53.703612 systemd[1]: Started session-13.scope. Dec 13 14:23:53.707000 audit[4397]: USER_START pid=4397 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.708000 audit[4399]: CRED_ACQ pid=4399 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:53.800801 kubelet[1940]: I1213 14:23:53.800750 1940 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:23:53.800801 kubelet[1940]: I1213 14:23:53.800802 1940 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:23:54.011522 sshd[4397]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:54.011000 audit[4397]: USER_END pid=4397 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:54.012000 audit[4397]: CRED_DISP pid=4397 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:54.016416 systemd[1]: Started sshd@13-10.0.0.66:22-10.0.0.1:45056.service. Dec 13 14:23:54.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.66:22-10.0.0.1:45056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:54.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.66:22-10.0.0.1:45048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:54.017070 systemd[1]: sshd@12-10.0.0.66:22-10.0.0.1:45048.service: Deactivated successfully. Dec 13 14:23:54.017926 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:23:54.019545 systemd-logind[1197]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:23:54.020501 systemd-logind[1197]: Removed session 13. Dec 13 14:23:54.052000 audit[4408]: USER_ACCT pid=4408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:54.053721 sshd[4408]: Accepted publickey for core from 10.0.0.1 port 45056 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:23:54.053000 audit[4408]: CRED_ACQ pid=4408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:54.053000 audit[4408]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe69ba7b20 a2=3 a3=0 items=0 ppid=1 pid=4408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:54.053000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:54.054917 sshd[4408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:54.058655 systemd-logind[1197]: New session 14 of user core. Dec 13 14:23:54.060004 systemd[1]: Started session-14.scope. Dec 13 14:23:54.063000 audit[4408]: USER_START pid=4408 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:54.067000 audit[4411]: CRED_ACQ pid=4411 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:54.179481 sshd[4408]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:54.179000 audit[4408]: USER_END pid=4408 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:54.180000 audit[4408]: CRED_DISP pid=4408 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:54.182594 systemd[1]: sshd@13-10.0.0.66:22-10.0.0.1:45056.service: Deactivated successfully. Dec 13 14:23:54.183525 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:23:54.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.66:22-10.0.0.1:45056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:54.184154 systemd-logind[1197]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:23:54.184962 systemd-logind[1197]: Removed session 14. Dec 13 14:23:55.699396 env[1206]: time="2024-12-13T14:23:55.699106076Z" level=info msg="StopPodSandbox for \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\"" Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.731 [WARNING][4436] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--g6jxc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33", Pod:"csi-node-driver-g6jxc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali49764a3b671", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.731 [INFO][4436] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.731 [INFO][4436] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" iface="eth0" netns="" Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.731 [INFO][4436] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.731 [INFO][4436] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.749 [INFO][4446] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" HandleID="k8s-pod-network.052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.749 [INFO][4446] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.750 [INFO][4446] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.755 [WARNING][4446] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" HandleID="k8s-pod-network.052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.756 [INFO][4446] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" HandleID="k8s-pod-network.052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.757 [INFO][4446] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:55.760139 env[1206]: 2024-12-13 14:23:55.758 [INFO][4436] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:55.760754 env[1206]: time="2024-12-13T14:23:55.760693774Z" level=info msg="TearDown network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\" successfully" Dec 13 14:23:55.760754 env[1206]: time="2024-12-13T14:23:55.760731737Z" level=info msg="StopPodSandbox for \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\" returns successfully" Dec 13 14:23:55.761280 env[1206]: time="2024-12-13T14:23:55.761251457Z" level=info msg="RemovePodSandbox for \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\"" Dec 13 14:23:55.761367 env[1206]: time="2024-12-13T14:23:55.761281414Z" level=info msg="Forcibly stopping sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\"" Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.805 [WARNING][4470] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--g6jxc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"35edeb5a-c3b3-4f6f-a27a-a5f0b2e22db2", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cba3190d70de201d6520c17036be885b1f71f9e1ae0f872264ca1a63f5c35a33", Pod:"csi-node-driver-g6jxc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali49764a3b671", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.805 [INFO][4470] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.806 [INFO][4470] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" iface="eth0" netns="" Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.806 [INFO][4470] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.806 [INFO][4470] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.829 [INFO][4477] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" HandleID="k8s-pod-network.052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.829 [INFO][4477] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.829 [INFO][4477] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.839 [WARNING][4477] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" HandleID="k8s-pod-network.052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.839 [INFO][4477] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" HandleID="k8s-pod-network.052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Workload="localhost-k8s-csi--node--driver--g6jxc-eth0" Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.841 [INFO][4477] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:55.844260 env[1206]: 2024-12-13 14:23:55.842 [INFO][4470] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f" Dec 13 14:23:55.844795 env[1206]: time="2024-12-13T14:23:55.844280094Z" level=info msg="TearDown network for sandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\" successfully" Dec 13 14:23:56.155164 env[1206]: time="2024-12-13T14:23:56.155102291Z" level=info msg="RemovePodSandbox \"052809499113c1346fc079efcf1fc9808b497b2f3422cd83aebb05292865340f\" returns successfully" Dec 13 14:23:56.155827 env[1206]: time="2024-12-13T14:23:56.155793368Z" level=info msg="StopPodSandbox for \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\"" Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.189 [WARNING][4499] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0", GenerateName:"calico-apiserver-6d8bbbc697-", Namespace:"calico-apiserver", SelfLink:"", UID:"795f1f51-9efb-40d4-81a9-a5178b33107e", ResourceVersion:"904", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d8bbbc697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4", Pod:"calico-apiserver-6d8bbbc697-bkcck", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliec601ee23b2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.189 [INFO][4499] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.189 [INFO][4499] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" iface="eth0" netns="" Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.190 [INFO][4499] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.190 [INFO][4499] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.215 [INFO][4506] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" HandleID="k8s-pod-network.22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.215 [INFO][4506] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.215 [INFO][4506] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.221 [WARNING][4506] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" HandleID="k8s-pod-network.22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.221 [INFO][4506] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" HandleID="k8s-pod-network.22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.223 [INFO][4506] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:56.226612 env[1206]: 2024-12-13 14:23:56.225 [INFO][4499] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:56.227174 env[1206]: time="2024-12-13T14:23:56.226637013Z" level=info msg="TearDown network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\" successfully" Dec 13 14:23:56.227174 env[1206]: time="2024-12-13T14:23:56.226666469Z" level=info msg="StopPodSandbox for \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\" returns successfully" Dec 13 14:23:56.227243 env[1206]: time="2024-12-13T14:23:56.227164799Z" level=info msg="RemovePodSandbox for \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\"" Dec 13 14:23:56.227243 env[1206]: time="2024-12-13T14:23:56.227200647Z" level=info msg="Forcibly stopping sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\"" Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.259 [WARNING][4528] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0", GenerateName:"calico-apiserver-6d8bbbc697-", Namespace:"calico-apiserver", SelfLink:"", UID:"795f1f51-9efb-40d4-81a9-a5178b33107e", ResourceVersion:"904", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d8bbbc697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7c2a527cfb891475d0bb73dbaf287b0551be1043d7106f5f04e38b92b04de2b4", Pod:"calico-apiserver-6d8bbbc697-bkcck", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliec601ee23b2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.259 [INFO][4528] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.259 [INFO][4528] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" iface="eth0" netns="" Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.259 [INFO][4528] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.259 [INFO][4528] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.279 [INFO][4535] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" HandleID="k8s-pod-network.22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.279 [INFO][4535] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.279 [INFO][4535] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.285 [WARNING][4535] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" HandleID="k8s-pod-network.22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.285 [INFO][4535] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" HandleID="k8s-pod-network.22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--bkcck-eth0" Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.287 [INFO][4535] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:56.291189 env[1206]: 2024-12-13 14:23:56.289 [INFO][4528] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601" Dec 13 14:23:56.291770 env[1206]: time="2024-12-13T14:23:56.291230583Z" level=info msg="TearDown network for sandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\" successfully" Dec 13 14:23:56.368949 env[1206]: time="2024-12-13T14:23:56.368877789Z" level=info msg="RemovePodSandbox \"22d0e77837d19df4e1e0cf28c124a8f3c57c027f83826338f840efb5254d4601\" returns successfully" Dec 13 14:23:56.369570 env[1206]: time="2024-12-13T14:23:56.369503050Z" level=info msg="StopPodSandbox for \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\"" Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.405 [WARNING][4558] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0", GenerateName:"calico-apiserver-6d8bbbc697-", Namespace:"calico-apiserver", SelfLink:"", UID:"ff494c46-81af-4525-a624-22909b19eeb7", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d8bbbc697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f", Pod:"calico-apiserver-6d8bbbc697-k25fw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7d0613defae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.405 [INFO][4558] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.405 [INFO][4558] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" iface="eth0" netns="" Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.405 [INFO][4558] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.405 [INFO][4558] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.425 [INFO][4566] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" HandleID="k8s-pod-network.52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.425 [INFO][4566] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.425 [INFO][4566] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.431 [WARNING][4566] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" HandleID="k8s-pod-network.52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.431 [INFO][4566] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" HandleID="k8s-pod-network.52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.432 [INFO][4566] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:56.436104 env[1206]: 2024-12-13 14:23:56.434 [INFO][4558] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:56.436104 env[1206]: time="2024-12-13T14:23:56.436073416Z" level=info msg="TearDown network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\" successfully" Dec 13 14:23:56.436722 env[1206]: time="2024-12-13T14:23:56.436113322Z" level=info msg="StopPodSandbox for \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\" returns successfully" Dec 13 14:23:56.437110 env[1206]: time="2024-12-13T14:23:56.437074994Z" level=info msg="RemovePodSandbox for \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\"" Dec 13 14:23:56.437181 env[1206]: time="2024-12-13T14:23:56.437118958Z" level=info msg="Forcibly stopping sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\"" Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.487 [WARNING][4590] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0", GenerateName:"calico-apiserver-6d8bbbc697-", Namespace:"calico-apiserver", SelfLink:"", UID:"ff494c46-81af-4525-a624-22909b19eeb7", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d8bbbc697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8a6c1da0d504b4710da53da9fee556d5f3ecf8c87ce7402a6991af57947c09f", Pod:"calico-apiserver-6d8bbbc697-k25fw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7d0613defae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.487 [INFO][4590] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.487 [INFO][4590] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" iface="eth0" netns="" Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.487 [INFO][4590] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.487 [INFO][4590] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.513 [INFO][4597] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" HandleID="k8s-pod-network.52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.513 [INFO][4597] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.513 [INFO][4597] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.521 [WARNING][4597] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" HandleID="k8s-pod-network.52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.521 [INFO][4597] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" HandleID="k8s-pod-network.52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Workload="localhost-k8s-calico--apiserver--6d8bbbc697--k25fw-eth0" Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.523 [INFO][4597] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:56.526759 env[1206]: 2024-12-13 14:23:56.525 [INFO][4590] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f" Dec 13 14:23:56.527431 env[1206]: time="2024-12-13T14:23:56.526826436Z" level=info msg="TearDown network for sandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\" successfully" Dec 13 14:23:56.532159 env[1206]: time="2024-12-13T14:23:56.532092697Z" level=info msg="RemovePodSandbox \"52d03182954acca61e8e4b0a726dd0c8af5676bdd1c35224c72114a273d5ba1f\" returns successfully" Dec 13 14:23:56.532674 env[1206]: time="2024-12-13T14:23:56.532629380Z" level=info msg="StopPodSandbox for \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\"" Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.570 [WARNING][4620] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a0fe477f-17fd-4d57-900b-ffc23cea95e4", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3", Pod:"coredns-6f6b679f8f-hcgzs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4193d30850f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.571 [INFO][4620] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.571 [INFO][4620] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" iface="eth0" netns="" Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.571 [INFO][4620] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.571 [INFO][4620] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.593 [INFO][4628] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" HandleID="k8s-pod-network.7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.593 [INFO][4628] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.593 [INFO][4628] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.599 [WARNING][4628] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" HandleID="k8s-pod-network.7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.599 [INFO][4628] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" HandleID="k8s-pod-network.7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.601 [INFO][4628] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:56.604824 env[1206]: 2024-12-13 14:23:56.603 [INFO][4620] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:56.605476 env[1206]: time="2024-12-13T14:23:56.604866180Z" level=info msg="TearDown network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\" successfully" Dec 13 14:23:56.605476 env[1206]: time="2024-12-13T14:23:56.604899513Z" level=info msg="StopPodSandbox for \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\" returns successfully" Dec 13 14:23:56.605476 env[1206]: time="2024-12-13T14:23:56.605451805Z" level=info msg="RemovePodSandbox for \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\"" Dec 13 14:23:56.605609 env[1206]: time="2024-12-13T14:23:56.605513322Z" level=info msg="Forcibly stopping sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\"" Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.643 [WARNING][4650] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a0fe477f-17fd-4d57-900b-ffc23cea95e4", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"add6415fb4d82fb63178986db96c8ca6317f70be23e88cf57d82e269f19ac6b3", Pod:"coredns-6f6b679f8f-hcgzs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4193d30850f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.643 [INFO][4650] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.643 [INFO][4650] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" iface="eth0" netns="" Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.643 [INFO][4650] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.643 [INFO][4650] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.666 [INFO][4659] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" HandleID="k8s-pod-network.7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.666 [INFO][4659] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.666 [INFO][4659] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.673 [WARNING][4659] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" HandleID="k8s-pod-network.7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.673 [INFO][4659] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" HandleID="k8s-pod-network.7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Workload="localhost-k8s-coredns--6f6b679f8f--hcgzs-eth0" Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.674 [INFO][4659] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:56.678745 env[1206]: 2024-12-13 14:23:56.676 [INFO][4650] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0" Dec 13 14:23:56.678745 env[1206]: time="2024-12-13T14:23:56.677940584Z" level=info msg="TearDown network for sandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\" successfully" Dec 13 14:23:56.682655 env[1206]: time="2024-12-13T14:23:56.682603757Z" level=info msg="RemovePodSandbox \"7ddc592c364fde764ac750433348793c28606a3ee5f0b220deb61d6c1b2f71d0\" returns successfully" Dec 13 14:23:56.683334 env[1206]: time="2024-12-13T14:23:56.683287138Z" level=info msg="StopPodSandbox for \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\"" Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.726 [WARNING][4681] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hkncl-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0a5a6be7-8147-4be4-b939-7481abcb12ec", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5", Pod:"coredns-6f6b679f8f-hkncl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2116ed9e053", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.726 [INFO][4681] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.726 [INFO][4681] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" iface="eth0" netns="" Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.726 [INFO][4681] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.726 [INFO][4681] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.747 [INFO][4688] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" HandleID="k8s-pod-network.c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.747 [INFO][4688] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.747 [INFO][4688] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.753 [WARNING][4688] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" HandleID="k8s-pod-network.c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.753 [INFO][4688] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" HandleID="k8s-pod-network.c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.755 [INFO][4688] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:56.760767 env[1206]: 2024-12-13 14:23:56.757 [INFO][4681] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:56.760767 env[1206]: time="2024-12-13T14:23:56.759434969Z" level=info msg="TearDown network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\" successfully" Dec 13 14:23:56.760767 env[1206]: time="2024-12-13T14:23:56.759478161Z" level=info msg="StopPodSandbox for \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\" returns successfully" Dec 13 14:23:56.761651 env[1206]: time="2024-12-13T14:23:56.760998166Z" level=info msg="RemovePodSandbox for \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\"" Dec 13 14:23:56.761651 env[1206]: time="2024-12-13T14:23:56.761145116Z" level=info msg="Forcibly stopping sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\"" Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.796 [WARNING][4712] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hkncl-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0a5a6be7-8147-4be4-b939-7481abcb12ec", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9459ed06248878e588bad69790658cda23987649d4b90e83546f58ed047820f5", Pod:"coredns-6f6b679f8f-hkncl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2116ed9e053", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.797 [INFO][4712] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.797 [INFO][4712] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" iface="eth0" netns="" Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.797 [INFO][4712] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.797 [INFO][4712] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.821 [INFO][4720] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" HandleID="k8s-pod-network.c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.821 [INFO][4720] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.821 [INFO][4720] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.827 [WARNING][4720] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" HandleID="k8s-pod-network.c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.827 [INFO][4720] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" HandleID="k8s-pod-network.c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Workload="localhost-k8s-coredns--6f6b679f8f--hkncl-eth0" Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.829 [INFO][4720] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:56.832634 env[1206]: 2024-12-13 14:23:56.831 [INFO][4712] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0" Dec 13 14:23:56.833086 env[1206]: time="2024-12-13T14:23:56.832662295Z" level=info msg="TearDown network for sandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\" successfully" Dec 13 14:23:56.938298 env[1206]: time="2024-12-13T14:23:56.938229343Z" level=info msg="RemovePodSandbox \"c370a59306c4390490bd5e0912951f967c04219275d2fda1936430926a501df0\" returns successfully" Dec 13 14:23:56.951104 env[1206]: time="2024-12-13T14:23:56.938787917Z" level=info msg="StopPodSandbox for \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\"" Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.969 [WARNING][4742] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0", GenerateName:"calico-kube-controllers-7b9b6c69b5-", Namespace:"calico-system", SelfLink:"", UID:"1e7ff74d-aead-442a-8f68-a0517ddd74e7", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b9b6c69b5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9", Pod:"calico-kube-controllers-7b9b6c69b5-qsx5x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8d5234ecb09", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.970 [INFO][4742] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.970 [INFO][4742] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" iface="eth0" netns="" Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.970 [INFO][4742] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.970 [INFO][4742] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.988 [INFO][4750] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" HandleID="k8s-pod-network.ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.988 [INFO][4750] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.988 [INFO][4750] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.994 [WARNING][4750] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" HandleID="k8s-pod-network.ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.994 [INFO][4750] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" HandleID="k8s-pod-network.ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.995 [INFO][4750] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:56.997736 env[1206]: 2024-12-13 14:23:56.996 [INFO][4742] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:56.998379 env[1206]: time="2024-12-13T14:23:56.997767534Z" level=info msg="TearDown network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\" successfully" Dec 13 14:23:56.998379 env[1206]: time="2024-12-13T14:23:56.997799134Z" level=info msg="StopPodSandbox for \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\" returns successfully" Dec 13 14:23:56.998459 env[1206]: time="2024-12-13T14:23:56.998420538Z" level=info msg="RemovePodSandbox for \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\"" Dec 13 14:23:56.998513 env[1206]: time="2024-12-13T14:23:56.998456266Z" level=info msg="Forcibly stopping sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\"" Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.030 [WARNING][4772] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0", GenerateName:"calico-kube-controllers-7b9b6c69b5-", Namespace:"calico-system", SelfLink:"", UID:"1e7ff74d-aead-442a-8f68-a0517ddd74e7", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b9b6c69b5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e7eb53cf4f691fd538ffa91b9aee5d3e03b438ce6d998ab91eaa8c314d9c45d9", Pod:"calico-kube-controllers-7b9b6c69b5-qsx5x", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8d5234ecb09", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.031 [INFO][4772] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.031 [INFO][4772] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" iface="eth0" netns="" Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.031 [INFO][4772] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.031 [INFO][4772] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.049 [INFO][4780] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" HandleID="k8s-pod-network.ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.049 [INFO][4780] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.049 [INFO][4780] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.055 [WARNING][4780] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" HandleID="k8s-pod-network.ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.055 [INFO][4780] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" HandleID="k8s-pod-network.ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Workload="localhost-k8s-calico--kube--controllers--7b9b6c69b5--qsx5x-eth0" Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.057 [INFO][4780] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:57.059825 env[1206]: 2024-12-13 14:23:57.058 [INFO][4772] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e" Dec 13 14:23:57.059825 env[1206]: time="2024-12-13T14:23:57.059769537Z" level=info msg="TearDown network for sandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\" successfully" Dec 13 14:23:57.119029 env[1206]: time="2024-12-13T14:23:57.118964983Z" level=info msg="RemovePodSandbox \"ab0563d96461f03f53c59d72f51bbab49e06c57a1cefbbb58e808ffdf766565e\" returns successfully" Dec 13 14:23:59.185267 systemd[1]: Started sshd@14-10.0.0.66:22-10.0.0.1:39066.service. Dec 13 14:23:59.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.66:22-10.0.0.1:39066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:59.186643 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:23:59.186692 kernel: audit: type=1130 audit(1734099839.184:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.66:22-10.0.0.1:39066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:59.222000 audit[4794]: USER_ACCT pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.223626 sshd[4794]: Accepted publickey for core from 10.0.0.1 port 39066 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:23:59.225372 sshd[4794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:59.224000 audit[4794]: CRED_ACQ pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.229358 systemd-logind[1197]: New session 15 of user core. Dec 13 14:23:59.230157 systemd[1]: Started session-15.scope. Dec 13 14:23:59.234008 kernel: audit: type=1101 audit(1734099839.222:1393): pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.234163 kernel: audit: type=1103 audit(1734099839.224:1394): pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.237182 kernel: audit: type=1006 audit(1734099839.224:1395): pid=4794 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:23:59.237260 kernel: audit: type=1300 audit(1734099839.224:1395): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd55423ff0 a2=3 a3=0 items=0 ppid=1 pid=4794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:59.224000 audit[4794]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd55423ff0 a2=3 a3=0 items=0 ppid=1 pid=4794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:59.242045 kernel: audit: type=1327 audit(1734099839.224:1395): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:59.224000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:59.243686 kernel: audit: type=1105 audit(1734099839.233:1396): pid=4794 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.233000 audit[4794]: USER_START pid=4794 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.249153 kernel: audit: type=1103 audit(1734099839.235:1397): pid=4796 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.235000 audit[4796]: CRED_ACQ pid=4796 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.283000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:59.283000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:59.294001 kernel: audit: type=1400 audit(1734099839.283:1398): avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:59.294135 kernel: audit: type=1400 audit(1734099839.283:1399): avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:59.283000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000672560 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:23:59.283000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a63ee0 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:23:59.283000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:59.283000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:59.283000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:59.283000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006725a0 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:23:59.283000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:59.285000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:59.285000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006725e0 a2=fc6 a3=0 items=0 ppid=1670 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c456 key=(null) Dec 13 14:23:59.285000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:59.362832 sshd[4794]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:59.363000 audit[4794]: USER_END pid=4794 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.363000 audit[4794]: CRED_DISP pid=4794 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:59.365981 systemd[1]: sshd@14-10.0.0.66:22-10.0.0.1:39066.service: Deactivated successfully. Dec 13 14:23:59.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.66:22-10.0.0.1:39066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:59.367022 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:23:59.367638 systemd-logind[1197]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:23:59.369058 systemd-logind[1197]: Removed session 15. Dec 13 14:24:04.367343 systemd[1]: Started sshd@15-10.0.0.66:22-10.0.0.1:39070.service. Dec 13 14:24:04.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.66:22-10.0.0.1:39070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:04.371854 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:24:04.371958 kernel: audit: type=1130 audit(1734099844.365:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.66:22-10.0.0.1:39070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:04.399000 audit[4818]: USER_ACCT pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.401318 sshd[4818]: Accepted publickey for core from 10.0.0.1 port 39070 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:04.403000 audit[4818]: CRED_ACQ pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.405918 sshd[4818]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:04.409524 kernel: audit: type=1101 audit(1734099844.399:1406): pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.409604 kernel: audit: type=1103 audit(1734099844.403:1407): pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.409363 systemd-logind[1197]: New session 16 of user core. Dec 13 14:24:04.410289 systemd[1]: Started session-16.scope. Dec 13 14:24:04.412333 kernel: audit: type=1006 audit(1734099844.403:1408): pid=4818 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:24:04.412397 kernel: audit: type=1300 audit(1734099844.403:1408): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd587ea5c0 a2=3 a3=0 items=0 ppid=1 pid=4818 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:04.403000 audit[4818]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd587ea5c0 a2=3 a3=0 items=0 ppid=1 pid=4818 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:04.403000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:04.421368 kernel: audit: type=1327 audit(1734099844.403:1408): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:04.421410 kernel: audit: type=1105 audit(1734099844.413:1409): pid=4818 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.413000 audit[4818]: USER_START pid=4818 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.425870 kernel: audit: type=1103 audit(1734099844.414:1410): pid=4820 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.414000 audit[4820]: CRED_ACQ pid=4820 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.527676 sshd[4818]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:04.526000 audit[4818]: USER_END pid=4818 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.530152 systemd[1]: sshd@15-10.0.0.66:22-10.0.0.1:39070.service: Deactivated successfully. Dec 13 14:24:04.530899 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:24:04.531484 systemd-logind[1197]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:24:04.532304 systemd-logind[1197]: Removed session 16. Dec 13 14:24:04.533867 kernel: audit: type=1106 audit(1734099844.526:1411): pid=4818 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.533938 kernel: audit: type=1104 audit(1734099844.526:1412): pid=4818 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.526000 audit[4818]: CRED_DISP pid=4818 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:04.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.66:22-10.0.0.1:39070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:06.236936 kubelet[1940]: I1213 14:24:06.236888 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:06.269000 audit[4834]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:06.269000 audit[4834]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe005c2f50 a2=0 a3=7ffe005c2f3c items=0 ppid=2100 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:06.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:06.277000 audit[4834]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:06.277000 audit[4834]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe005c2f50 a2=0 a3=7ffe005c2f3c items=0 ppid=2100 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:06.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:09.532571 systemd[1]: Started sshd@16-10.0.0.66:22-10.0.0.1:39208.service. Dec 13 14:24:09.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.66:22-10.0.0.1:39208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.533972 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:24:09.534120 kernel: audit: type=1130 audit(1734099849.531:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.66:22-10.0.0.1:39208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:09.570000 audit[4857]: USER_ACCT pid=4857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.571274 sshd[4857]: Accepted publickey for core from 10.0.0.1 port 39208 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:09.573503 sshd[4857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:09.572000 audit[4857]: CRED_ACQ pid=4857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.577739 systemd-logind[1197]: New session 17 of user core. Dec 13 14:24:09.578897 systemd[1]: Started session-17.scope. Dec 13 14:24:09.579736 kernel: audit: type=1101 audit(1734099849.570:1417): pid=4857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.579790 kernel: audit: type=1103 audit(1734099849.572:1418): pid=4857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.579817 kernel: audit: type=1006 audit(1734099849.572:1419): pid=4857 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:24:09.572000 audit[4857]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc66a52260 a2=3 a3=0 items=0 ppid=1 pid=4857 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:09.587017 kernel: audit: type=1300 audit(1734099849.572:1419): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc66a52260 a2=3 a3=0 items=0 ppid=1 pid=4857 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:09.587087 kernel: audit: type=1327 audit(1734099849.572:1419): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:09.572000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:09.583000 audit[4857]: USER_START pid=4857 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.593632 kernel: audit: type=1105 audit(1734099849.583:1420): pid=4857 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.593681 kernel: audit: type=1103 audit(1734099849.584:1421): pid=4859 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.584000 audit[4859]: CRED_ACQ pid=4859 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.718612 sshd[4857]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:09.718000 audit[4857]: USER_END pid=4857 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.721313 systemd[1]: sshd@16-10.0.0.66:22-10.0.0.1:39208.service: Deactivated successfully. Dec 13 14:24:09.722073 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:24:09.722813 systemd-logind[1197]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:24:09.723645 systemd-logind[1197]: Removed session 17. Dec 13 14:24:09.719000 audit[4857]: CRED_DISP pid=4857 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.727891 kernel: audit: type=1106 audit(1734099849.718:1422): pid=4857 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.727938 kernel: audit: type=1104 audit(1734099849.719:1423): pid=4857 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:09.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.66:22-10.0.0.1:39208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:11.721257 kubelet[1940]: E1213 14:24:11.721200 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:13.755611 kubelet[1940]: I1213 14:24:13.755557 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:13.788000 audit[4891]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:13.788000 audit[4891]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe7db42130 a2=0 a3=7ffe7db4211c items=0 ppid=2100 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.788000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:13.795000 audit[4891]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:13.795000 audit[4891]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe7db42130 a2=0 a3=7ffe7db4211c items=0 ppid=2100 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:14.723035 systemd[1]: Started sshd@17-10.0.0.66:22-10.0.0.1:39218.service. Dec 13 14:24:14.729914 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:24:14.730104 kernel: audit: type=1130 audit(1734099854.722:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.66:22-10.0.0.1:39218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.66:22-10.0.0.1:39218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:14.760000 audit[4893]: USER_ACCT pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.761964 sshd[4893]: Accepted publickey for core from 10.0.0.1 port 39218 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:14.763224 sshd[4893]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:14.767085 systemd-logind[1197]: New session 18 of user core. Dec 13 14:24:14.767337 systemd[1]: Started session-18.scope. Dec 13 14:24:14.761000 audit[4893]: CRED_ACQ pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.772596 kernel: audit: type=1101 audit(1734099854.760:1428): pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.772672 kernel: audit: type=1103 audit(1734099854.761:1429): pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.772711 kernel: audit: type=1006 audit(1734099854.761:1430): pid=4893 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:24:14.761000 audit[4893]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe51db2d70 a2=3 a3=0 items=0 ppid=1 pid=4893 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.780183 kernel: audit: type=1300 audit(1734099854.761:1430): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe51db2d70 a2=3 a3=0 items=0 ppid=1 pid=4893 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.780251 kernel: audit: type=1327 audit(1734099854.761:1430): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:14.761000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:14.771000 audit[4893]: USER_START pid=4893 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.786941 kernel: audit: type=1105 audit(1734099854.771:1431): pid=4893 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.772000 audit[4895]: CRED_ACQ pid=4895 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.791136 kernel: audit: type=1103 audit(1734099854.772:1432): pid=4895 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.911417 sshd[4893]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:14.911000 audit[4893]: USER_END pid=4893 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.914096 systemd[1]: sshd@17-10.0.0.66:22-10.0.0.1:39218.service: Deactivated successfully. Dec 13 14:24:14.914954 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:24:14.915643 systemd-logind[1197]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:24:14.916493 systemd-logind[1197]: Removed session 18. Dec 13 14:24:14.916859 kernel: audit: type=1106 audit(1734099854.911:1433): pid=4893 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.916923 kernel: audit: type=1104 audit(1734099854.911:1434): pid=4893 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.911000 audit[4893]: CRED_DISP pid=4893 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:14.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.66:22-10.0.0.1:39218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:18.720822 kubelet[1940]: E1213 14:24:18.720775 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:19.915391 systemd[1]: Started sshd@18-10.0.0.66:22-10.0.0.1:36568.service. Dec 13 14:24:19.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.66:22-10.0.0.1:36568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.916588 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:24:19.916629 kernel: audit: type=1130 audit(1734099859.914:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.66:22-10.0.0.1:36568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.947000 audit[4912]: USER_ACCT pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.948670 sshd[4912]: Accepted publickey for core from 10.0.0.1 port 36568 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:19.949868 sshd[4912]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:19.948000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.957459 systemd-logind[1197]: New session 19 of user core. Dec 13 14:24:19.958412 kernel: audit: type=1101 audit(1734099859.947:1437): pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.958448 kernel: audit: type=1103 audit(1734099859.948:1438): pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.958734 systemd[1]: Started session-19.scope. Dec 13 14:24:19.961716 kernel: audit: type=1006 audit(1734099859.948:1439): pid=4912 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 14:24:19.948000 audit[4912]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6c3dea50 a2=3 a3=0 items=0 ppid=1 pid=4912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:19.948000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:19.970380 kernel: audit: type=1300 audit(1734099859.948:1439): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6c3dea50 a2=3 a3=0 items=0 ppid=1 pid=4912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:19.970444 kernel: audit: type=1327 audit(1734099859.948:1439): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:19.970486 kernel: audit: type=1105 audit(1734099859.963:1440): pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.963000 audit[4912]: USER_START pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.965000 audit[4914]: CRED_ACQ pid=4914 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.979290 kernel: audit: type=1103 audit(1734099859.965:1441): pid=4914 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.096559 sshd[4912]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:20.097000 audit[4912]: USER_END pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.100401 systemd[1]: sshd@18-10.0.0.66:22-10.0.0.1:36568.service: Deactivated successfully. Dec 13 14:24:20.101142 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:24:20.102065 systemd-logind[1197]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:24:20.097000 audit[4912]: CRED_DISP pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.103336 systemd[1]: Started sshd@19-10.0.0.66:22-10.0.0.1:36572.service. Dec 13 14:24:20.104119 systemd-logind[1197]: Removed session 19. Dec 13 14:24:20.109476 kernel: audit: type=1106 audit(1734099860.097:1442): pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.109594 kernel: audit: type=1104 audit(1734099860.097:1443): pid=4912 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.66:22-10.0.0.1:36568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.66:22-10.0.0.1:36572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.140000 audit[4925]: USER_ACCT pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.141360 sshd[4925]: Accepted publickey for core from 10.0.0.1 port 36572 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:20.141000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.141000 audit[4925]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1e17cb80 a2=3 a3=0 items=0 ppid=1 pid=4925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:20.141000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:20.142530 sshd[4925]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:20.146966 systemd-logind[1197]: New session 20 of user core. Dec 13 14:24:20.148014 systemd[1]: Started session-20.scope. Dec 13 14:24:20.152000 audit[4925]: USER_START pid=4925 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.154000 audit[4927]: CRED_ACQ pid=4927 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.544224 sshd[4925]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:20.545000 audit[4925]: USER_END pid=4925 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.545000 audit[4925]: CRED_DISP pid=4925 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.66:22-10.0.0.1:36586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.66:22-10.0.0.1:36572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:20.547368 systemd[1]: Started sshd@20-10.0.0.66:22-10.0.0.1:36586.service. Dec 13 14:24:20.548383 systemd[1]: sshd@19-10.0.0.66:22-10.0.0.1:36572.service: Deactivated successfully. Dec 13 14:24:20.549158 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:24:20.550529 systemd-logind[1197]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:24:20.551356 systemd-logind[1197]: Removed session 20. Dec 13 14:24:20.583000 audit[4936]: USER_ACCT pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.584210 sshd[4936]: Accepted publickey for core from 10.0.0.1 port 36586 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:20.584000 audit[4936]: CRED_ACQ pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.584000 audit[4936]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeca7eab10 a2=3 a3=0 items=0 ppid=1 pid=4936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:20.584000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:20.585777 sshd[4936]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:20.589932 systemd-logind[1197]: New session 21 of user core. Dec 13 14:24:20.590821 systemd[1]: Started session-21.scope. Dec 13 14:24:20.595000 audit[4936]: USER_START pid=4936 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:20.597000 audit[4939]: CRED_ACQ pid=4939 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:22.279442 systemd[1]: run-containerd-runc-k8s.io-c513a4f82d023baa443352de40e195b2bcaf63cdeaa85f3f17effdcd918bcf11-runc.bbBRZD.mount: Deactivated successfully. Dec 13 14:24:23.806000 audit[4993]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:23.806000 audit[4993]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd2c31b940 a2=0 a3=7ffd2c31b92c items=0 ppid=2100 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:23.810000 audit[4993]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:23.810000 audit[4993]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd2c31b940 a2=0 a3=0 items=0 ppid=2100 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:24.075000 audit[4995]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=4995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:24.075000 audit[4995]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd39086c30 a2=0 a3=7ffd39086c1c items=0 ppid=2100 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:24.081000 audit[4995]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:24.081000 audit[4995]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd39086c30 a2=0 a3=0 items=0 ppid=2100 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:24.149325 sshd[4936]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:24.149000 audit[4936]: USER_END pid=4936 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.149000 audit[4936]: CRED_DISP pid=4936 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.153550 systemd[1]: Started sshd@21-10.0.0.66:22-10.0.0.1:36588.service. Dec 13 14:24:24.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.66:22-10.0.0.1:36588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:24.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.66:22-10.0.0.1:36586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:24.154150 systemd[1]: sshd@20-10.0.0.66:22-10.0.0.1:36586.service: Deactivated successfully. Dec 13 14:24:24.155031 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:24:24.156029 systemd-logind[1197]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:24:24.157178 systemd-logind[1197]: Removed session 21. Dec 13 14:24:24.192000 audit[4997]: USER_ACCT pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.193619 sshd[4997]: Accepted publickey for core from 10.0.0.1 port 36588 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:24.193000 audit[4997]: CRED_ACQ pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.193000 audit[4997]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb7b8a30 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.193000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:24.195116 sshd[4997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:24.200021 systemd-logind[1197]: New session 22 of user core. Dec 13 14:24:24.200778 systemd[1]: Started session-22.scope. Dec 13 14:24:24.204000 audit[4997]: USER_START pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.206000 audit[5000]: CRED_ACQ pid=5000 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.033186 sshd[4997]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:25.033000 audit[4997]: USER_END pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.035450 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 14:24:25.061466 kernel: audit: type=1106 audit(1734099865.033:1473): pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.061529 kernel: audit: type=1104 audit(1734099865.033:1474): pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.068277 kernel: audit: type=1131 audit(1734099865.035:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.66:22-10.0.0.1:36588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:25.068335 kernel: audit: type=1130 audit(1734099865.037:1476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.66:22-10.0.0.1:36600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:25.033000 audit[4997]: CRED_DISP pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.66:22-10.0.0.1:36588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:25.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.66:22-10.0.0.1:36600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:25.036333 systemd[1]: sshd@21-10.0.0.66:22-10.0.0.1:36588.service: Deactivated successfully. Dec 13 14:24:25.036921 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:24:25.037558 systemd-logind[1197]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:24:25.038636 systemd[1]: Started sshd@22-10.0.0.66:22-10.0.0.1:36600.service. Dec 13 14:24:25.039283 systemd-logind[1197]: Removed session 22. Dec 13 14:24:25.090000 audit[5009]: USER_ACCT pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.091122 sshd[5009]: Accepted publickey for core from 10.0.0.1 port 36600 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:25.093345 sshd[5009]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:25.094864 kernel: audit: type=1101 audit(1734099865.090:1477): pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.094921 kernel: audit: type=1103 audit(1734099865.092:1478): pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.092000 audit[5009]: CRED_ACQ pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.096919 systemd-logind[1197]: New session 23 of user core. Dec 13 14:24:25.097702 systemd[1]: Started session-23.scope. Dec 13 14:24:25.101628 kernel: audit: type=1006 audit(1734099865.092:1479): pid=5009 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:24:25.101683 kernel: audit: type=1300 audit(1734099865.092:1479): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2f74d310 a2=3 a3=0 items=0 ppid=1 pid=5009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.092000 audit[5009]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2f74d310 a2=3 a3=0 items=0 ppid=1 pid=5009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.092000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:25.118444 kernel: audit: type=1327 audit(1734099865.092:1479): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:25.118512 kernel: audit: type=1105 audit(1734099865.101:1480): pid=5009 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.101000 audit[5009]: USER_START pid=5009 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.102000 audit[5011]: CRED_ACQ pid=5011 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.227378 sshd[5009]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:25.227000 audit[5009]: USER_END pid=5009 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.227000 audit[5009]: CRED_DISP pid=5009 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:25.230502 systemd[1]: sshd@22-10.0.0.66:22-10.0.0.1:36600.service: Deactivated successfully. Dec 13 14:24:25.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.66:22-10.0.0.1:36600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:25.231444 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:24:25.232349 systemd-logind[1197]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:24:25.233220 systemd-logind[1197]: Removed session 23. Dec 13 14:24:25.720955 kubelet[1940]: E1213 14:24:25.720908 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:27.720703 kubelet[1940]: E1213 14:24:27.720641 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:30.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.66:22-10.0.0.1:58216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:30.233161 systemd[1]: Started sshd@23-10.0.0.66:22-10.0.0.1:58216.service. Dec 13 14:24:30.234189 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:24:30.234242 kernel: audit: type=1130 audit(1734099870.232:1485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.66:22-10.0.0.1:58216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:30.265000 audit[5023]: USER_ACCT pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.267061 sshd[5023]: Accepted publickey for core from 10.0.0.1 port 58216 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:30.269433 sshd[5023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:30.268000 audit[5023]: CRED_ACQ pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.273421 systemd-logind[1197]: New session 24 of user core. Dec 13 14:24:30.274384 systemd[1]: Started session-24.scope. Dec 13 14:24:30.275455 kernel: audit: type=1101 audit(1734099870.265:1486): pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.275600 kernel: audit: type=1103 audit(1734099870.268:1487): pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.275658 kernel: audit: type=1006 audit(1734099870.268:1488): pid=5023 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:24:30.268000 audit[5023]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedb7d3040 a2=3 a3=0 items=0 ppid=1 pid=5023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:30.282438 kernel: audit: type=1300 audit(1734099870.268:1488): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedb7d3040 a2=3 a3=0 items=0 ppid=1 pid=5023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:30.282512 kernel: audit: type=1327 audit(1734099870.268:1488): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:30.268000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:30.283875 kernel: audit: type=1105 audit(1734099870.279:1489): pid=5023 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.279000 audit[5023]: USER_START pid=5023 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.288778 kernel: audit: type=1103 audit(1734099870.280:1490): pid=5025 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.280000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.389363 sshd[5023]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:30.389000 audit[5023]: USER_END pid=5023 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.391750 systemd[1]: sshd@23-10.0.0.66:22-10.0.0.1:58216.service: Deactivated successfully. Dec 13 14:24:30.392515 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:24:30.389000 audit[5023]: CRED_DISP pid=5023 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.395999 systemd-logind[1197]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:24:30.396735 systemd-logind[1197]: Removed session 24. Dec 13 14:24:30.398672 kernel: audit: type=1106 audit(1734099870.389:1491): pid=5023 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.398722 kernel: audit: type=1104 audit(1734099870.389:1492): pid=5023 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:30.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.66:22-10.0.0.1:58216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:31.770000 audit[5037]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:31.770000 audit[5037]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe0ec29c90 a2=0 a3=7ffe0ec29c7c items=0 ppid=2100 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:31.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:31.775000 audit[5037]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:31.775000 audit[5037]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe0ec29c90 a2=0 a3=7ffe0ec29c7c items=0 ppid=2100 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:31.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:35.394343 systemd[1]: Started sshd@24-10.0.0.66:22-10.0.0.1:58222.service. Dec 13 14:24:35.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.66:22-10.0.0.1:58222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:35.396065 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:24:35.396118 kernel: audit: type=1130 audit(1734099875.393:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.66:22-10.0.0.1:58222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:35.427000 audit[5042]: USER_ACCT pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.428785 sshd[5042]: Accepted publickey for core from 10.0.0.1 port 58222 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:35.430930 sshd[5042]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:35.429000 audit[5042]: CRED_ACQ pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.435219 systemd-logind[1197]: New session 25 of user core. Dec 13 14:24:35.436275 systemd[1]: Started session-25.scope. Dec 13 14:24:35.437000 kernel: audit: type=1101 audit(1734099875.427:1497): pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.437043 kernel: audit: type=1103 audit(1734099875.429:1498): pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.437060 kernel: audit: type=1006 audit(1734099875.429:1499): pid=5042 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:24:35.429000 audit[5042]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc43dc17e0 a2=3 a3=0 items=0 ppid=1 pid=5042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:35.443779 kernel: audit: type=1300 audit(1734099875.429:1499): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc43dc17e0 a2=3 a3=0 items=0 ppid=1 pid=5042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:35.443862 kernel: audit: type=1327 audit(1734099875.429:1499): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:35.429000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:35.440000 audit[5042]: USER_START pid=5042 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.449813 kernel: audit: type=1105 audit(1734099875.440:1500): pid=5042 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.449886 kernel: audit: type=1103 audit(1734099875.441:1501): pid=5044 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.441000 audit[5044]: CRED_ACQ pid=5044 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.540891 sshd[5042]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:35.540000 audit[5042]: USER_END pid=5042 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.543565 systemd[1]: sshd@24-10.0.0.66:22-10.0.0.1:58222.service: Deactivated successfully. Dec 13 14:24:35.544347 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:24:35.540000 audit[5042]: CRED_DISP pid=5042 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.550526 kernel: audit: type=1106 audit(1734099875.540:1502): pid=5042 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.550665 kernel: audit: type=1104 audit(1734099875.540:1503): pid=5042 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:35.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.66:22-10.0.0.1:58222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:35.551190 systemd-logind[1197]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:24:35.551994 systemd-logind[1197]: Removed session 25. Dec 13 14:24:39.083962 update_engine[1198]: I1213 14:24:39.083899 1198 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Dec 13 14:24:39.083962 update_engine[1198]: I1213 14:24:39.083963 1198 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Dec 13 14:24:39.085164 update_engine[1198]: I1213 14:24:39.085131 1198 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Dec 13 14:24:39.085809 update_engine[1198]: I1213 14:24:39.085778 1198 omaha_request_params.cc:62] Current group set to lts Dec 13 14:24:39.088445 update_engine[1198]: I1213 14:24:39.088393 1198 update_attempter.cc:499] Already updated boot flags. Skipping. Dec 13 14:24:39.088445 update_engine[1198]: I1213 14:24:39.088428 1198 update_attempter.cc:643] Scheduling an action processor start. Dec 13 14:24:39.088667 update_engine[1198]: I1213 14:24:39.088634 1198 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 14:24:39.089516 update_engine[1198]: I1213 14:24:39.089494 1198 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Dec 13 14:24:39.089615 update_engine[1198]: I1213 14:24:39.089601 1198 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 14:24:39.089615 update_engine[1198]: I1213 14:24:39.089610 1198 omaha_request_action.cc:271] Request: Dec 13 14:24:39.089615 update_engine[1198]: Dec 13 14:24:39.089615 update_engine[1198]: Dec 13 14:24:39.089615 update_engine[1198]: Dec 13 14:24:39.089615 update_engine[1198]: Dec 13 14:24:39.089615 update_engine[1198]: Dec 13 14:24:39.089615 update_engine[1198]: Dec 13 14:24:39.089615 update_engine[1198]: Dec 13 14:24:39.089615 update_engine[1198]: Dec 13 14:24:39.089615 update_engine[1198]: I1213 14:24:39.089615 1198 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:24:39.093424 update_engine[1198]: I1213 14:24:39.093395 1198 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:24:39.093999 update_engine[1198]: I1213 14:24:39.093983 1198 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:24:39.098432 locksmithd[1235]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Dec 13 14:24:39.112964 update_engine[1198]: E1213 14:24:39.112936 1198 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:24:39.113026 update_engine[1198]: I1213 14:24:39.113011 1198 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Dec 13 14:24:40.546257 systemd[1]: Started sshd@25-10.0.0.66:22-10.0.0.1:35550.service. Dec 13 14:24:40.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.66:22-10.0.0.1:35550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:40.547524 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:24:40.547600 kernel: audit: type=1130 audit(1734099880.545:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.66:22-10.0.0.1:35550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:40.581000 audit[5058]: USER_ACCT pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.583128 sshd[5058]: Accepted publickey for core from 10.0.0.1 port 35550 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:40.586000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.587798 sshd[5058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:40.587968 kernel: audit: type=1101 audit(1734099880.581:1506): pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.587996 kernel: audit: type=1103 audit(1734099880.586:1507): pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.591395 systemd-logind[1197]: New session 26 of user core. Dec 13 14:24:40.592166 systemd[1]: Started session-26.scope. Dec 13 14:24:40.594063 kernel: audit: type=1006 audit(1734099880.586:1508): pid=5058 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:24:40.594106 kernel: audit: type=1300 audit(1734099880.586:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0f298d80 a2=3 a3=0 items=0 ppid=1 pid=5058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.586000 audit[5058]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0f298d80 a2=3 a3=0 items=0 ppid=1 pid=5058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:40.600097 kernel: audit: type=1327 audit(1734099880.586:1508): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:40.600292 kernel: audit: type=1105 audit(1734099880.596:1509): pid=5058 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.596000 audit[5058]: USER_START pid=5058 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.597000 audit[5060]: CRED_ACQ pid=5060 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.608680 kernel: audit: type=1103 audit(1734099880.597:1510): pid=5060 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.699193 sshd[5058]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:40.699000 audit[5058]: USER_END pid=5058 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.701322 systemd[1]: sshd@25-10.0.0.66:22-10.0.0.1:35550.service: Deactivated successfully. Dec 13 14:24:40.702188 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:24:40.702803 systemd-logind[1197]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:24:40.703562 systemd-logind[1197]: Removed session 26. Dec 13 14:24:40.699000 audit[5058]: CRED_DISP pid=5058 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.709346 kernel: audit: type=1106 audit(1734099880.699:1511): pid=5058 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.709430 kernel: audit: type=1104 audit(1734099880.699:1512): pid=5058 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.66:22-10.0.0.1:35550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:42.720977 kubelet[1940]: E1213 14:24:42.720926 1940 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:43.860000 audit[4045]: AVC avc: denied { watch } for pid=4045 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_23_24.3528734736/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c132,c598 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c132,c598 tclass=file permissive=0 Dec 13 14:24:43.860000 audit[4045]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001594160 a2=fc6 a3=0 items=0 ppid=3532 pid=4045 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c132,c598 key=(null) Dec 13 14:24:43.860000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:24:45.664000 audit[4212]: AVC avc: denied { watch } for pid=4212 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_23_24.1675901024/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c991 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c359,c991 tclass=file permissive=0 Dec 13 14:24:45.666707 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:24:45.666766 kernel: audit: type=1400 audit(1734099885.664:1515): avc: denied { watch } for pid=4212 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_23_24.1675901024/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c991 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c359,c991 tclass=file permissive=0 Dec 13 14:24:45.664000 audit[4212]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001bb9140 a2=fc6 a3=0 items=0 ppid=3640 pid=4212 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c991 key=(null) Dec 13 14:24:45.686589 kernel: audit: type=1300 audit(1734099885.664:1515): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001bb9140 a2=fc6 a3=0 items=0 ppid=3640 pid=4212 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c991 key=(null) Dec 13 14:24:45.686647 kernel: audit: type=1327 audit(1734099885.664:1515): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:24:45.664000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:24:45.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.66:22-10.0.0.1:35554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:45.703958 systemd[1]: Started sshd@26-10.0.0.66:22-10.0.0.1:35554.service. Dec 13 14:24:45.725880 kernel: audit: type=1130 audit(1734099885.703:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.66:22-10.0.0.1:35554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:45.775000 audit[5091]: USER_ACCT pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:45.776455 sshd[5091]: Accepted publickey for core from 10.0.0.1 port 35554 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:24:45.780872 kernel: audit: type=1101 audit(1734099885.775:1517): pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:45.780000 audit[5091]: CRED_ACQ pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:45.782646 sshd[5091]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:45.786631 systemd-logind[1197]: New session 27 of user core. Dec 13 14:24:45.787702 systemd[1]: Started session-27.scope. Dec 13 14:24:45.805434 kernel: audit: type=1103 audit(1734099885.780:1518): pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:45.805526 kernel: audit: type=1006 audit(1734099885.780:1519): pid=5091 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:24:45.805555 kernel: audit: type=1300 audit(1734099885.780:1519): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb5fc1fc0 a2=3 a3=0 items=0 ppid=1 pid=5091 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.780000 audit[5091]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb5fc1fc0 a2=3 a3=0 items=0 ppid=1 pid=5091 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:45.780000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:45.811454 kernel: audit: type=1327 audit(1734099885.780:1519): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:45.811510 kernel: audit: type=1105 audit(1734099885.790:1520): pid=5091 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:45.790000 audit[5091]: USER_START pid=5091 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:45.790000 audit[5093]: CRED_ACQ pid=5093 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:45.928172 sshd[5091]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:45.928000 audit[5091]: USER_END pid=5091 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:45.928000 audit[5091]: CRED_DISP pid=5091 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:45.931151 systemd[1]: sshd@26-10.0.0.66:22-10.0.0.1:35554.service: Deactivated successfully. Dec 13 14:24:45.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.66:22-10.0.0.1:35554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:45.931893 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:24:45.932620 systemd-logind[1197]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:24:45.933418 systemd-logind[1197]: Removed session 27.