Dec 13 01:47:51.830144 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 01:47:51.830160 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:47:51.830170 kernel: BIOS-provided physical RAM map: Dec 13 01:47:51.830176 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:47:51.830181 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:47:51.830187 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:47:51.830193 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:47:51.830199 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:47:51.830205 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:47:51.830212 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:47:51.830218 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 01:47:51.830223 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:47:51.830229 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:47:51.830235 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:47:51.830242 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:47:51.830249 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:47:51.830255 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:47:51.830260 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:47:51.830266 kernel: NX (Execute Disable) protection: active Dec 13 01:47:51.830272 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:47:51.830278 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:47:51.830284 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:47:51.830290 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:47:51.830296 kernel: extended physical RAM map: Dec 13 01:47:51.830302 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:47:51.830309 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:47:51.830315 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:47:51.830321 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:47:51.830327 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:47:51.830333 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:47:51.830339 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:47:51.830345 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 01:47:51.830351 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 01:47:51.830357 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 01:47:51.830363 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 01:47:51.830369 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 01:47:51.830375 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:47:51.830381 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:47:51.830387 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:47:51.830393 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:47:51.830402 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:47:51.830409 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:47:51.830415 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:47:51.830422 kernel: efi: EFI v2.70 by EDK II Dec 13 01:47:51.830429 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 01:47:51.830435 kernel: random: crng init done Dec 13 01:47:51.830441 kernel: SMBIOS 2.8 present. Dec 13 01:47:51.830448 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 01:47:51.830454 kernel: Hypervisor detected: KVM Dec 13 01:47:51.830460 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 01:47:51.830467 kernel: kvm-clock: cpu 0, msr 4819b001, primary cpu clock Dec 13 01:47:51.830473 kernel: kvm-clock: using sched offset of 3993542392 cycles Dec 13 01:47:51.830481 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 01:47:51.830488 kernel: tsc: Detected 2794.748 MHz processor Dec 13 01:47:51.830495 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 01:47:51.830501 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 01:47:51.830530 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 01:47:51.830537 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 01:47:51.830544 kernel: Using GB pages for direct mapping Dec 13 01:47:51.830550 kernel: Secure boot disabled Dec 13 01:47:51.830557 kernel: ACPI: Early table checksum verification disabled Dec 13 01:47:51.830565 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 01:47:51.830571 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 01:47:51.830578 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:47:51.830585 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:47:51.830591 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 01:47:51.830598 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:47:51.830604 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:47:51.830611 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:47:51.830617 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:47:51.830625 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 01:47:51.830631 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 01:47:51.830638 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 01:47:51.830644 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 01:47:51.830651 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 01:47:51.830657 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 01:47:51.830664 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 01:47:51.830670 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 01:47:51.830677 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 01:47:51.830685 kernel: No NUMA configuration found Dec 13 01:47:51.830692 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 01:47:51.830699 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 01:47:51.830705 kernel: Zone ranges: Dec 13 01:47:51.830712 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 01:47:51.830718 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 01:47:51.830725 kernel: Normal empty Dec 13 01:47:51.830731 kernel: Movable zone start for each node Dec 13 01:47:51.830738 kernel: Early memory node ranges Dec 13 01:47:51.830745 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 01:47:51.830751 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 01:47:51.830758 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 01:47:51.830764 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 01:47:51.830771 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 01:47:51.830777 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 01:47:51.830784 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 01:47:51.830790 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:47:51.830797 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 01:47:51.830803 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 01:47:51.830811 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:47:51.830818 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 01:47:51.830824 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 01:47:51.830831 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 01:47:51.830837 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 01:47:51.830844 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 01:47:51.830850 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 01:47:51.830857 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 01:47:51.830863 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 01:47:51.830871 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 01:47:51.830877 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 01:47:51.830884 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 01:47:51.830891 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 01:47:51.830897 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 01:47:51.830903 kernel: TSC deadline timer available Dec 13 01:47:51.830910 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 01:47:51.830916 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 01:47:51.830923 kernel: kvm-guest: setup PV sched yield Dec 13 01:47:51.830930 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 01:47:51.830937 kernel: Booting paravirtualized kernel on KVM Dec 13 01:47:51.830947 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 01:47:51.830964 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 01:47:51.830971 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 01:47:51.830978 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 01:47:51.830985 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 01:47:51.830991 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 01:47:51.830998 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 01:47:51.831005 kernel: kvm-guest: PV spinlocks enabled Dec 13 01:47:51.831012 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 01:47:51.831019 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 01:47:51.831027 kernel: Policy zone: DMA32 Dec 13 01:47:51.831035 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:47:51.831042 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 01:47:51.831049 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 01:47:51.831057 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 01:47:51.831064 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 01:47:51.831071 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 169308K reserved, 0K cma-reserved) Dec 13 01:47:51.831079 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 01:47:51.831085 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 01:47:51.831092 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 01:47:51.831099 kernel: rcu: Hierarchical RCU implementation. Dec 13 01:47:51.831107 kernel: rcu: RCU event tracing is enabled. Dec 13 01:47:51.831121 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 01:47:51.831134 kernel: Rude variant of Tasks RCU enabled. Dec 13 01:47:51.831140 kernel: Tracing variant of Tasks RCU enabled. Dec 13 01:47:51.831147 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 01:47:51.831154 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 01:47:51.831161 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 01:47:51.831168 kernel: Console: colour dummy device 80x25 Dec 13 01:47:51.831175 kernel: printk: console [ttyS0] enabled Dec 13 01:47:51.831182 kernel: ACPI: Core revision 20210730 Dec 13 01:47:51.831189 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 01:47:51.831197 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 01:47:51.831204 kernel: x2apic enabled Dec 13 01:47:51.831211 kernel: Switched APIC routing to physical x2apic. Dec 13 01:47:51.831217 kernel: kvm-guest: setup PV IPIs Dec 13 01:47:51.831225 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 01:47:51.831232 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 01:47:51.831239 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 01:47:51.831246 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 01:47:51.831253 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 01:47:51.831261 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 01:47:51.831268 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 01:47:51.831274 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 01:47:51.831282 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 01:47:51.831288 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 01:47:51.831300 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 01:47:51.831307 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 01:47:51.831314 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 01:47:51.831321 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 01:47:51.831329 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 01:47:51.831336 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 01:47:51.831343 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 01:47:51.831349 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 01:47:51.831356 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 01:47:51.831363 kernel: Freeing SMP alternatives memory: 32K Dec 13 01:47:51.831370 kernel: pid_max: default: 32768 minimum: 301 Dec 13 01:47:51.831377 kernel: LSM: Security Framework initializing Dec 13 01:47:51.831384 kernel: SELinux: Initializing. Dec 13 01:47:51.831391 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:47:51.831399 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:47:51.831406 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 01:47:51.831413 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 01:47:51.831420 kernel: ... version: 0 Dec 13 01:47:51.831427 kernel: ... bit width: 48 Dec 13 01:47:51.831434 kernel: ... generic registers: 6 Dec 13 01:47:51.831441 kernel: ... value mask: 0000ffffffffffff Dec 13 01:47:51.831447 kernel: ... max period: 00007fffffffffff Dec 13 01:47:51.831456 kernel: ... fixed-purpose events: 0 Dec 13 01:47:51.831463 kernel: ... event mask: 000000000000003f Dec 13 01:47:51.831469 kernel: signal: max sigframe size: 1776 Dec 13 01:47:51.831476 kernel: rcu: Hierarchical SRCU implementation. Dec 13 01:47:51.831484 kernel: smp: Bringing up secondary CPUs ... Dec 13 01:47:51.831490 kernel: x86: Booting SMP configuration: Dec 13 01:47:51.831497 kernel: .... node #0, CPUs: #1 Dec 13 01:47:51.831511 kernel: kvm-clock: cpu 1, msr 4819b041, secondary cpu clock Dec 13 01:47:51.831542 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 01:47:51.831559 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 01:47:51.831566 kernel: #2 Dec 13 01:47:51.831573 kernel: kvm-clock: cpu 2, msr 4819b081, secondary cpu clock Dec 13 01:47:51.831580 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 01:47:51.831587 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 01:47:51.831594 kernel: #3 Dec 13 01:47:51.831601 kernel: kvm-clock: cpu 3, msr 4819b0c1, secondary cpu clock Dec 13 01:47:51.831607 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 01:47:51.831614 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 01:47:51.831621 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 01:47:51.831629 kernel: smpboot: Max logical packages: 1 Dec 13 01:47:51.831636 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 01:47:51.831642 kernel: devtmpfs: initialized Dec 13 01:47:51.831649 kernel: x86/mm: Memory block size: 128MB Dec 13 01:47:51.831656 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 01:47:51.831663 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 01:47:51.831672 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 01:47:51.831680 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 01:47:51.831688 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 01:47:51.831698 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 01:47:51.831705 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 01:47:51.831711 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 01:47:51.831718 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 01:47:51.831725 kernel: audit: initializing netlink subsys (disabled) Dec 13 01:47:51.831732 kernel: audit: type=2000 audit(1734054471.370:1): state=initialized audit_enabled=0 res=1 Dec 13 01:47:51.831739 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 01:47:51.831746 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 01:47:51.831753 kernel: cpuidle: using governor menu Dec 13 01:47:51.831760 kernel: ACPI: bus type PCI registered Dec 13 01:47:51.831767 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 01:47:51.831774 kernel: dca service started, version 1.12.1 Dec 13 01:47:51.831781 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 01:47:51.831788 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 01:47:51.831795 kernel: PCI: Using configuration type 1 for base access Dec 13 01:47:51.831802 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 01:47:51.831809 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 01:47:51.831817 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 01:47:51.831824 kernel: ACPI: Added _OSI(Module Device) Dec 13 01:47:51.831831 kernel: ACPI: Added _OSI(Processor Device) Dec 13 01:47:51.831838 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 01:47:51.831844 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 01:47:51.831851 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 01:47:51.831858 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 01:47:51.831865 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 01:47:51.831872 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 01:47:51.831879 kernel: ACPI: Interpreter enabled Dec 13 01:47:51.831887 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 01:47:51.831894 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 01:47:51.831901 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 01:47:51.831908 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 01:47:51.831915 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 01:47:51.832029 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 01:47:51.832103 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 01:47:51.832173 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 01:47:51.832182 kernel: PCI host bridge to bus 0000:00 Dec 13 01:47:51.832260 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 01:47:51.832321 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 01:47:51.832382 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 01:47:51.832447 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 01:47:51.832556 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 01:47:51.832620 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 01:47:51.832681 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 01:47:51.832762 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 01:47:51.832838 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 01:47:51.832907 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 01:47:51.832975 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 01:47:51.833043 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 01:47:51.833112 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 01:47:51.833179 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 01:47:51.833254 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 01:47:51.833327 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 01:47:51.833395 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 01:47:51.833463 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 01:47:51.833596 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 01:47:51.833671 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 01:47:51.833738 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 01:47:51.833805 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 01:47:51.833879 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 01:47:51.833947 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 01:47:51.834015 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 01:47:51.834084 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 01:47:51.834152 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 01:47:51.834224 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 01:47:51.834292 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 01:47:51.834370 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 01:47:51.834437 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 01:47:51.834510 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 01:47:51.834602 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 01:47:51.834671 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 01:47:51.834683 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 01:47:51.834691 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 01:47:51.834699 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 01:47:51.834706 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 01:47:51.834713 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 01:47:51.834720 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 01:47:51.834729 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 01:47:51.834736 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 01:47:51.834743 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 01:47:51.834750 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 01:47:51.834757 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 01:47:51.834763 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 01:47:51.834770 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 01:47:51.834777 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 01:47:51.834784 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 01:47:51.834792 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 01:47:51.834799 kernel: iommu: Default domain type: Translated Dec 13 01:47:51.834806 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 01:47:51.834874 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 01:47:51.834942 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 01:47:51.835008 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 01:47:51.835018 kernel: vgaarb: loaded Dec 13 01:47:51.835025 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 01:47:51.835032 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 01:47:51.835041 kernel: PTP clock support registered Dec 13 01:47:51.835048 kernel: Registered efivars operations Dec 13 01:47:51.835055 kernel: PCI: Using ACPI for IRQ routing Dec 13 01:47:51.835062 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 01:47:51.835069 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 01:47:51.835075 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 01:47:51.835082 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 01:47:51.835089 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 01:47:51.835096 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 01:47:51.835105 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 01:47:51.835111 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 01:47:51.835118 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 01:47:51.835125 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 01:47:51.835132 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 01:47:51.835139 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 01:47:51.835146 kernel: pnp: PnP ACPI init Dec 13 01:47:51.835219 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 01:47:51.835232 kernel: pnp: PnP ACPI: found 6 devices Dec 13 01:47:51.835239 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 01:47:51.835246 kernel: NET: Registered PF_INET protocol family Dec 13 01:47:51.835253 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 01:47:51.835260 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 01:47:51.835267 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 01:47:51.835274 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 01:47:51.835281 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 01:47:51.835289 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 01:47:51.835296 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:47:51.835303 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:47:51.835310 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 01:47:51.835317 kernel: NET: Registered PF_XDP protocol family Dec 13 01:47:51.835386 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 01:47:51.835454 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 01:47:51.835912 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 01:47:51.835995 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 01:47:51.836057 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 01:47:51.836117 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 01:47:51.836175 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 01:47:51.836235 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 01:47:51.836244 kernel: PCI: CLS 0 bytes, default 64 Dec 13 01:47:51.836251 kernel: Initialise system trusted keyrings Dec 13 01:47:51.836258 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 01:47:51.836265 kernel: Key type asymmetric registered Dec 13 01:47:51.836274 kernel: Asymmetric key parser 'x509' registered Dec 13 01:47:51.836281 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 01:47:51.836296 kernel: io scheduler mq-deadline registered Dec 13 01:47:51.836304 kernel: io scheduler kyber registered Dec 13 01:47:51.836312 kernel: io scheduler bfq registered Dec 13 01:47:51.836319 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 01:47:51.836327 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 01:47:51.836334 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 01:47:51.836341 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 01:47:51.836350 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 01:47:51.836357 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 01:47:51.836364 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 01:47:51.836372 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 01:47:51.836379 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 01:47:51.836450 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 01:47:51.836461 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 01:47:51.836581 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 01:47:51.836648 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T01:47:51 UTC (1734054471) Dec 13 01:47:51.836714 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 01:47:51.836723 kernel: efifb: probing for efifb Dec 13 01:47:51.836731 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 01:47:51.836738 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 01:47:51.836745 kernel: efifb: scrolling: redraw Dec 13 01:47:51.836752 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 01:47:51.836760 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 01:47:51.836767 kernel: fb0: EFI VGA frame buffer device Dec 13 01:47:51.836777 kernel: pstore: Registered efi as persistent store backend Dec 13 01:47:51.836785 kernel: NET: Registered PF_INET6 protocol family Dec 13 01:47:51.836792 kernel: Segment Routing with IPv6 Dec 13 01:47:51.836800 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 01:47:51.836807 kernel: NET: Registered PF_PACKET protocol family Dec 13 01:47:51.836815 kernel: Key type dns_resolver registered Dec 13 01:47:51.836823 kernel: IPI shorthand broadcast: enabled Dec 13 01:47:51.836830 kernel: sched_clock: Marking stable (413994742, 127451104)->(584946703, -43500857) Dec 13 01:47:51.836837 kernel: registered taskstats version 1 Dec 13 01:47:51.836844 kernel: Loading compiled-in X.509 certificates Dec 13 01:47:51.836852 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 01:47:51.836859 kernel: Key type .fscrypt registered Dec 13 01:47:51.836866 kernel: Key type fscrypt-provisioning registered Dec 13 01:47:51.836873 kernel: pstore: Using crash dump compression: deflate Dec 13 01:47:51.836881 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 01:47:51.836890 kernel: ima: Allocated hash algorithm: sha1 Dec 13 01:47:51.836897 kernel: ima: No architecture policies found Dec 13 01:47:51.836904 kernel: clk: Disabling unused clocks Dec 13 01:47:51.836911 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 01:47:51.836919 kernel: Write protecting the kernel read-only data: 28672k Dec 13 01:47:51.836926 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 01:47:51.836933 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 01:47:51.836940 kernel: Run /init as init process Dec 13 01:47:51.836949 kernel: with arguments: Dec 13 01:47:51.836956 kernel: /init Dec 13 01:47:51.836963 kernel: with environment: Dec 13 01:47:51.836970 kernel: HOME=/ Dec 13 01:47:51.836977 kernel: TERM=linux Dec 13 01:47:51.836984 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 01:47:51.836993 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:47:51.837003 systemd[1]: Detected virtualization kvm. Dec 13 01:47:51.837013 systemd[1]: Detected architecture x86-64. Dec 13 01:47:51.837029 systemd[1]: Running in initrd. Dec 13 01:47:51.837037 systemd[1]: No hostname configured, using default hostname. Dec 13 01:47:51.837044 systemd[1]: Hostname set to . Dec 13 01:47:51.837052 systemd[1]: Initializing machine ID from VM UUID. Dec 13 01:47:51.837060 systemd[1]: Queued start job for default target initrd.target. Dec 13 01:47:51.837067 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:47:51.837075 systemd[1]: Reached target cryptsetup.target. Dec 13 01:47:51.837082 systemd[1]: Reached target paths.target. Dec 13 01:47:51.837091 systemd[1]: Reached target slices.target. Dec 13 01:47:51.837098 systemd[1]: Reached target swap.target. Dec 13 01:47:51.837106 systemd[1]: Reached target timers.target. Dec 13 01:47:51.837114 systemd[1]: Listening on iscsid.socket. Dec 13 01:47:51.837122 systemd[1]: Listening on iscsiuio.socket. Dec 13 01:47:51.837129 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:47:51.837137 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:47:51.837146 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:47:51.837153 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:47:51.837161 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:47:51.837168 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:47:51.837176 systemd[1]: Reached target sockets.target. Dec 13 01:47:51.837184 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:47:51.837191 systemd[1]: Finished network-cleanup.service. Dec 13 01:47:51.837199 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 01:47:51.837206 systemd[1]: Starting systemd-journald.service... Dec 13 01:47:51.837215 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:47:51.837222 systemd[1]: Starting systemd-resolved.service... Dec 13 01:47:51.837230 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 01:47:51.837237 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:47:51.837245 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 01:47:51.837253 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 01:47:51.837260 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 01:47:51.837268 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:47:51.837275 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:47:51.837287 systemd-journald[199]: Journal started Dec 13 01:47:51.837324 systemd-journald[199]: Runtime Journal (/run/log/journal/0edf7384bf4e4a69bb6ed895eafaf61e) is 6.0M, max 48.4M, 42.4M free. Dec 13 01:47:51.826630 systemd-modules-load[200]: Inserted module 'overlay' Dec 13 01:47:51.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.843061 kernel: audit: type=1130 audit(1734054471.839:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.843125 systemd[1]: Started systemd-journald.service. Dec 13 01:47:51.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.847545 kernel: audit: type=1130 audit(1734054471.843:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.852103 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 01:47:51.856661 kernel: audit: type=1130 audit(1734054471.852:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.855062 systemd-resolved[201]: Positive Trust Anchors: Dec 13 01:47:51.855069 systemd-resolved[201]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:47:51.855095 systemd-resolved[201]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:47:51.866590 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 01:47:51.856286 systemd[1]: Starting dracut-cmdline.service... Dec 13 01:47:51.870829 kernel: audit: type=1130 audit(1734054471.866:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.857255 systemd-resolved[201]: Defaulting to hostname 'linux'. Dec 13 01:47:51.858210 systemd[1]: Started systemd-resolved.service. Dec 13 01:47:51.873706 kernel: Bridge firewalling registered Dec 13 01:47:51.867048 systemd[1]: Reached target nss-lookup.target. Dec 13 01:47:51.873689 systemd-modules-load[200]: Inserted module 'br_netfilter' Dec 13 01:47:51.882916 dracut-cmdline[217]: dracut-dracut-053 Dec 13 01:47:51.884717 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:47:51.890531 kernel: SCSI subsystem initialized Dec 13 01:47:51.901799 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 01:47:51.901820 kernel: device-mapper: uevent: version 1.0.3 Dec 13 01:47:51.903051 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 01:47:51.905699 systemd-modules-load[200]: Inserted module 'dm_multipath' Dec 13 01:47:51.906744 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:47:51.911204 kernel: audit: type=1130 audit(1734054471.906:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.910574 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:47:51.916525 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:47:51.920765 kernel: audit: type=1130 audit(1734054471.916:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:51.951547 kernel: Loading iSCSI transport class v2.0-870. Dec 13 01:47:51.967543 kernel: iscsi: registered transport (tcp) Dec 13 01:47:51.988540 kernel: iscsi: registered transport (qla4xxx) Dec 13 01:47:51.988555 kernel: QLogic iSCSI HBA Driver Dec 13 01:47:52.016601 systemd[1]: Finished dracut-cmdline.service. Dec 13 01:47:52.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.017512 systemd[1]: Starting dracut-pre-udev.service... Dec 13 01:47:52.022256 kernel: audit: type=1130 audit(1734054472.016:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.061539 kernel: raid6: avx2x4 gen() 30105 MB/s Dec 13 01:47:52.078533 kernel: raid6: avx2x4 xor() 7427 MB/s Dec 13 01:47:52.095532 kernel: raid6: avx2x2 gen() 32247 MB/s Dec 13 01:47:52.112532 kernel: raid6: avx2x2 xor() 19311 MB/s Dec 13 01:47:52.129531 kernel: raid6: avx2x1 gen() 26658 MB/s Dec 13 01:47:52.146531 kernel: raid6: avx2x1 xor() 15388 MB/s Dec 13 01:47:52.163532 kernel: raid6: sse2x4 gen() 14863 MB/s Dec 13 01:47:52.180532 kernel: raid6: sse2x4 xor() 7201 MB/s Dec 13 01:47:52.197532 kernel: raid6: sse2x2 gen() 16204 MB/s Dec 13 01:47:52.214533 kernel: raid6: sse2x2 xor() 9862 MB/s Dec 13 01:47:52.231532 kernel: raid6: sse2x1 gen() 12436 MB/s Dec 13 01:47:52.248915 kernel: raid6: sse2x1 xor() 7827 MB/s Dec 13 01:47:52.248932 kernel: raid6: using algorithm avx2x2 gen() 32247 MB/s Dec 13 01:47:52.248941 kernel: raid6: .... xor() 19311 MB/s, rmw enabled Dec 13 01:47:52.249637 kernel: raid6: using avx2x2 recovery algorithm Dec 13 01:47:52.261536 kernel: xor: automatically using best checksumming function avx Dec 13 01:47:52.349537 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 01:47:52.356560 systemd[1]: Finished dracut-pre-udev.service. Dec 13 01:47:52.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.360000 audit: BPF prog-id=7 op=LOAD Dec 13 01:47:52.361832 kernel: audit: type=1130 audit(1734054472.357:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.361851 kernel: audit: type=1334 audit(1734054472.360:10): prog-id=7 op=LOAD Dec 13 01:47:52.361000 audit: BPF prog-id=8 op=LOAD Dec 13 01:47:52.362177 systemd[1]: Starting systemd-udevd.service... Dec 13 01:47:52.373617 systemd-udevd[400]: Using default interface naming scheme 'v252'. Dec 13 01:47:52.377345 systemd[1]: Started systemd-udevd.service. Dec 13 01:47:52.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.381665 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 01:47:52.390268 dracut-pre-trigger[413]: rd.md=0: removing MD RAID activation Dec 13 01:47:52.411469 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 01:47:52.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.413721 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:47:52.443924 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:47:52.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.467691 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 01:47:52.495855 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 01:47:52.495873 kernel: GPT:9289727 != 19775487 Dec 13 01:47:52.495885 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 01:47:52.495902 kernel: GPT:9289727 != 19775487 Dec 13 01:47:52.495913 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 01:47:52.495924 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:47:52.495937 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 01:47:52.495948 kernel: libata version 3.00 loaded. Dec 13 01:47:52.506552 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 01:47:52.506579 kernel: AES CTR mode by8 optimization enabled Dec 13 01:47:52.513987 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 01:47:52.550026 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 01:47:52.550048 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 01:47:52.550136 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 01:47:52.550209 kernel: scsi host0: ahci Dec 13 01:47:52.550297 kernel: scsi host1: ahci Dec 13 01:47:52.550384 kernel: scsi host2: ahci Dec 13 01:47:52.550466 kernel: scsi host3: ahci Dec 13 01:47:52.550588 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (451) Dec 13 01:47:52.550599 kernel: scsi host4: ahci Dec 13 01:47:52.550682 kernel: scsi host5: ahci Dec 13 01:47:52.550761 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 01:47:52.550771 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 01:47:52.550780 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 01:47:52.550788 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 01:47:52.550797 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 01:47:52.550807 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 01:47:52.526030 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 01:47:52.527889 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 01:47:52.533157 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 01:47:52.538491 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 01:47:52.548481 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:47:52.555268 systemd[1]: Starting disk-uuid.service... Dec 13 01:47:52.561835 disk-uuid[543]: Primary Header is updated. Dec 13 01:47:52.561835 disk-uuid[543]: Secondary Entries is updated. Dec 13 01:47:52.561835 disk-uuid[543]: Secondary Header is updated. Dec 13 01:47:52.565413 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:47:52.567531 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:47:52.856554 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 01:47:52.856612 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 01:47:52.857538 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 01:47:52.858550 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 01:47:52.860015 kernel: ata3.00: applying bridge limits Dec 13 01:47:52.860030 kernel: ata3.00: configured for UDMA/100 Dec 13 01:47:52.860536 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 01:47:52.865531 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 01:47:52.865552 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 01:47:52.866538 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 01:47:52.894534 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 01:47:52.911034 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 01:47:52.911046 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 01:47:53.568496 disk-uuid[544]: The operation has completed successfully. Dec 13 01:47:53.570406 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:47:53.593569 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 01:47:53.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.593644 systemd[1]: Finished disk-uuid.service. Dec 13 01:47:53.596631 systemd[1]: Starting verity-setup.service... Dec 13 01:47:53.607533 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 01:47:53.624058 systemd[1]: Found device dev-mapper-usr.device. Dec 13 01:47:53.626694 systemd[1]: Mounting sysusr-usr.mount... Dec 13 01:47:53.628966 systemd[1]: Finished verity-setup.service. Dec 13 01:47:53.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.683075 systemd[1]: Mounted sysusr-usr.mount. Dec 13 01:47:53.684546 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 01:47:53.684592 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 01:47:53.686530 systemd[1]: Starting ignition-setup.service... Dec 13 01:47:53.688378 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 01:47:53.695084 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:47:53.695116 kernel: BTRFS info (device vda6): using free space tree Dec 13 01:47:53.695126 kernel: BTRFS info (device vda6): has skinny extents Dec 13 01:47:53.701694 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 01:47:53.709022 systemd[1]: Finished ignition-setup.service. Dec 13 01:47:53.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.710618 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 01:47:53.744513 ignition[647]: Ignition 2.14.0 Dec 13 01:47:53.745484 ignition[647]: Stage: fetch-offline Dec 13 01:47:53.746237 ignition[647]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:47:53.747171 ignition[647]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:47:53.748318 ignition[647]: parsed url from cmdline: "" Dec 13 01:47:53.748328 ignition[647]: no config URL provided Dec 13 01:47:53.748336 ignition[647]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:47:53.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.750593 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 01:47:53.748344 ignition[647]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:47:53.753000 audit: BPF prog-id=9 op=LOAD Dec 13 01:47:53.748366 ignition[647]: op(1): [started] loading QEMU firmware config module Dec 13 01:47:53.748370 ignition[647]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 01:47:53.752813 ignition[647]: op(1): [finished] loading QEMU firmware config module Dec 13 01:47:53.757757 systemd[1]: Starting systemd-networkd.service... Dec 13 01:47:53.795694 ignition[647]: parsing config with SHA512: d55f04eb421791faf75d1dcb8ff09cea8d43c8e6afdc06ce870fa894d9754a76d487438c0b612dad0e500ebf08539fa0bd1dbfb49cfea7704e559e0dbf463435 Dec 13 01:47:53.803122 unknown[647]: fetched base config from "system" Dec 13 01:47:53.803145 unknown[647]: fetched user config from "qemu" Dec 13 01:47:53.803668 ignition[647]: fetch-offline: fetch-offline passed Dec 13 01:47:53.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.804768 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 01:47:53.803736 ignition[647]: Ignition finished successfully Dec 13 01:47:53.819749 systemd-networkd[725]: lo: Link UP Dec 13 01:47:53.819757 systemd-networkd[725]: lo: Gained carrier Dec 13 01:47:53.821572 systemd-networkd[725]: Enumeration completed Dec 13 01:47:53.821669 systemd[1]: Started systemd-networkd.service. Dec 13 01:47:53.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.822301 systemd[1]: Reached target network.target. Dec 13 01:47:53.824393 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 01:47:53.825129 systemd[1]: Starting ignition-kargs.service... Dec 13 01:47:53.826471 systemd[1]: Starting iscsiuio.service... Dec 13 01:47:53.829442 systemd-networkd[725]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:47:53.830605 systemd-networkd[725]: eth0: Link UP Dec 13 01:47:53.830608 systemd-networkd[725]: eth0: Gained carrier Dec 13 01:47:53.834182 systemd[1]: Started iscsiuio.service. Dec 13 01:47:53.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.837227 systemd[1]: Starting iscsid.service... Dec 13 01:47:53.839409 ignition[729]: Ignition 2.14.0 Dec 13 01:47:53.842212 iscsid[737]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:47:53.842212 iscsid[737]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 01:47:53.842212 iscsid[737]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 01:47:53.842212 iscsid[737]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 01:47:53.842212 iscsid[737]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 01:47:53.842212 iscsid[737]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:47:53.842212 iscsid[737]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 01:47:53.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.839416 ignition[729]: Stage: kargs Dec 13 01:47:53.841959 systemd[1]: Finished ignition-kargs.service. Dec 13 01:47:53.839537 ignition[729]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:47:53.842576 systemd-networkd[725]: eth0: DHCPv4 address 10.0.0.22/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 01:47:53.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.839549 ignition[729]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:47:53.843826 systemd[1]: Starting ignition-disks.service... Dec 13 01:47:53.840836 ignition[729]: kargs: kargs passed Dec 13 01:47:53.850960 systemd[1]: Started iscsid.service. Dec 13 01:47:53.840880 ignition[729]: Ignition finished successfully Dec 13 01:47:53.852443 systemd[1]: Starting dracut-initqueue.service... Dec 13 01:47:53.850944 ignition[738]: Ignition 2.14.0 Dec 13 01:47:53.855253 systemd[1]: Finished ignition-disks.service. Dec 13 01:47:53.850953 ignition[738]: Stage: disks Dec 13 01:47:53.857041 systemd[1]: Reached target initrd-root-device.target. Dec 13 01:47:53.851061 ignition[738]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:47:53.859234 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:47:53.886967 systemd-fsck[758]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 01:47:53.851073 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:47:53.859468 systemd[1]: Reached target local-fs.target. Dec 13 01:47:53.852186 ignition[738]: disks: disks passed Dec 13 01:47:53.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.859886 systemd[1]: Reached target sysinit.target. Dec 13 01:47:53.852230 ignition[738]: Ignition finished successfully Dec 13 01:47:53.860049 systemd[1]: Reached target basic.target. Dec 13 01:47:53.861763 systemd[1]: Finished dracut-initqueue.service. Dec 13 01:47:53.861904 systemd[1]: Reached target remote-fs-pre.target. Dec 13 01:47:53.862020 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:47:53.900365 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 01:47:53.862184 systemd[1]: Reached target remote-fs.target. Dec 13 01:47:53.862904 systemd[1]: Starting dracut-pre-mount.service... Dec 13 01:47:53.871672 systemd[1]: Finished dracut-pre-mount.service. Dec 13 01:47:53.873720 systemd[1]: Starting systemd-fsck-root.service... Dec 13 01:47:53.889679 systemd[1]: Finished systemd-fsck-root.service. Dec 13 01:47:53.892092 systemd[1]: Mounting sysroot.mount... Dec 13 01:47:53.899407 systemd[1]: Mounted sysroot.mount. Dec 13 01:47:53.900415 systemd[1]: Reached target initrd-root-fs.target. Dec 13 01:47:53.902613 systemd[1]: Mounting sysroot-usr.mount... Dec 13 01:47:53.903697 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 01:47:53.912670 initrd-setup-root[768]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 01:47:53.903724 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 01:47:53.915691 initrd-setup-root[776]: cut: /sysroot/etc/group: No such file or directory Dec 13 01:47:53.903740 systemd[1]: Reached target ignition-diskful.target. Dec 13 01:47:53.917666 initrd-setup-root[784]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 01:47:53.905680 systemd[1]: Mounted sysroot-usr.mount. Dec 13 01:47:53.907064 systemd[1]: Starting initrd-setup-root.service... Dec 13 01:47:53.920387 initrd-setup-root[792]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 01:47:53.939172 systemd[1]: Finished initrd-setup-root.service. Dec 13 01:47:53.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.940746 systemd[1]: Starting ignition-mount.service... Dec 13 01:47:53.941474 systemd[1]: Starting sysroot-boot.service... Dec 13 01:47:53.948170 bash[810]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 01:47:53.955066 ignition[811]: INFO : Ignition 2.14.0 Dec 13 01:47:53.955066 ignition[811]: INFO : Stage: mount Dec 13 01:47:53.956692 ignition[811]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:47:53.956692 ignition[811]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:47:53.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.957230 systemd[1]: Finished sysroot-boot.service. Dec 13 01:47:53.961423 ignition[811]: INFO : mount: mount passed Dec 13 01:47:53.962241 ignition[811]: INFO : Ignition finished successfully Dec 13 01:47:53.962654 systemd[1]: Finished ignition-mount.service. Dec 13 01:47:53.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:54.634368 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:47:54.640541 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (819) Dec 13 01:47:54.640575 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:47:54.641972 kernel: BTRFS info (device vda6): using free space tree Dec 13 01:47:54.641986 kernel: BTRFS info (device vda6): has skinny extents Dec 13 01:47:54.645439 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:47:54.646873 systemd[1]: Starting ignition-files.service... Dec 13 01:47:54.658781 ignition[839]: INFO : Ignition 2.14.0 Dec 13 01:47:54.658781 ignition[839]: INFO : Stage: files Dec 13 01:47:54.660639 ignition[839]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:47:54.660639 ignition[839]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:47:54.660639 ignition[839]: DEBUG : files: compiled without relabeling support, skipping Dec 13 01:47:54.660639 ignition[839]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 01:47:54.660639 ignition[839]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 01:47:54.667256 ignition[839]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 01:47:54.667256 ignition[839]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 01:47:54.667256 ignition[839]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 01:47:54.667256 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:47:54.667256 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 01:47:54.662268 unknown[839]: wrote ssh authorized keys file for user: core Dec 13 01:47:54.702862 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 01:47:54.772616 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:47:54.772616 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:47:54.776682 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 01:47:55.231237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 01:47:55.265673 systemd-networkd[725]: eth0: Gained IPv6LL Dec 13 01:47:55.882257 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:47:55.882257 ignition[839]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 01:47:55.886841 ignition[839]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 01:47:55.909138 ignition[839]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 01:47:55.911665 ignition[839]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 01:47:55.911665 ignition[839]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:47:55.911665 ignition[839]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:47:55.911665 ignition[839]: INFO : files: files passed Dec 13 01:47:55.911665 ignition[839]: INFO : Ignition finished successfully Dec 13 01:47:55.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.910509 systemd[1]: Finished ignition-files.service. Dec 13 01:47:55.912347 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 01:47:55.914008 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 01:47:55.927072 initrd-setup-root-after-ignition[864]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 01:47:55.914484 systemd[1]: Starting ignition-quench.service... Dec 13 01:47:55.929399 initrd-setup-root-after-ignition[866]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 01:47:55.916675 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 01:47:55.916737 systemd[1]: Finished ignition-quench.service. Dec 13 01:47:55.919165 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 01:47:55.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.920789 systemd[1]: Reached target ignition-complete.target. Dec 13 01:47:55.922906 systemd[1]: Starting initrd-parse-etc.service... Dec 13 01:47:55.932370 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 01:47:55.932455 systemd[1]: Finished initrd-parse-etc.service. Dec 13 01:47:55.933599 systemd[1]: Reached target initrd-fs.target. Dec 13 01:47:55.935329 systemd[1]: Reached target initrd.target. Dec 13 01:47:55.936119 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 01:47:55.936643 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 01:47:55.944971 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 01:47:55.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.946122 systemd[1]: Starting initrd-cleanup.service... Dec 13 01:47:55.953346 systemd[1]: Stopped target nss-lookup.target. Dec 13 01:47:55.954225 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 01:47:55.955770 systemd[1]: Stopped target timers.target. Dec 13 01:47:55.957262 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 01:47:55.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.957349 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 01:47:55.958799 systemd[1]: Stopped target initrd.target. Dec 13 01:47:55.960377 systemd[1]: Stopped target basic.target. Dec 13 01:47:55.961822 systemd[1]: Stopped target ignition-complete.target. Dec 13 01:47:55.963346 systemd[1]: Stopped target ignition-diskful.target. Dec 13 01:47:55.964850 systemd[1]: Stopped target initrd-root-device.target. Dec 13 01:47:55.966504 systemd[1]: Stopped target remote-fs.target. Dec 13 01:47:55.968047 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 01:47:55.969672 systemd[1]: Stopped target sysinit.target. Dec 13 01:47:55.971111 systemd[1]: Stopped target local-fs.target. Dec 13 01:47:55.972617 systemd[1]: Stopped target local-fs-pre.target. Dec 13 01:47:55.974086 systemd[1]: Stopped target swap.target. Dec 13 01:47:55.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.975473 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 01:47:55.975578 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 01:47:55.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.977061 systemd[1]: Stopped target cryptsetup.target. Dec 13 01:47:55.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.978427 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 01:47:55.978509 systemd[1]: Stopped dracut-initqueue.service. Dec 13 01:47:55.980177 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 01:47:55.980260 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 01:47:55.981757 systemd[1]: Stopped target paths.target. Dec 13 01:47:55.983124 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 01:47:55.986554 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 01:47:55.987609 systemd[1]: Stopped target slices.target. Dec 13 01:47:55.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.988981 systemd[1]: Stopped target sockets.target. Dec 13 01:47:55.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.990732 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 01:47:55.997008 iscsid[737]: iscsid shutting down. Dec 13 01:47:55.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.990821 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 01:47:55.992513 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 01:47:56.001933 ignition[879]: INFO : Ignition 2.14.0 Dec 13 01:47:56.001933 ignition[879]: INFO : Stage: umount Dec 13 01:47:56.001933 ignition[879]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:47:56.001933 ignition[879]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:47:56.001933 ignition[879]: INFO : umount: umount passed Dec 13 01:47:56.001933 ignition[879]: INFO : Ignition finished successfully Dec 13 01:47:56.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.992604 systemd[1]: Stopped ignition-files.service. Dec 13 01:47:56.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.994525 systemd[1]: Stopping ignition-mount.service... Dec 13 01:47:55.995436 systemd[1]: Stopping iscsid.service... Dec 13 01:47:55.996969 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 01:47:55.997087 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 01:47:56.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:55.998662 systemd[1]: Stopping sysroot-boot.service... Dec 13 01:47:56.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.000099 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 01:47:56.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.000228 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 01:47:56.002057 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 01:47:56.002164 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 01:47:56.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.005324 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 01:47:56.005405 systemd[1]: Stopped iscsid.service. Dec 13 01:47:56.007608 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 01:47:56.007668 systemd[1]: Stopped ignition-mount.service. Dec 13 01:47:56.009756 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 01:47:56.009815 systemd[1]: Finished initrd-cleanup.service. Dec 13 01:47:56.012172 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 01:47:56.012986 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 01:47:56.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.013011 systemd[1]: Closed iscsid.socket. Dec 13 01:47:56.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.014785 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 01:47:56.014823 systemd[1]: Stopped ignition-disks.service. Dec 13 01:47:56.016589 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 01:47:56.040000 audit: BPF prog-id=6 op=UNLOAD Dec 13 01:47:56.016624 systemd[1]: Stopped ignition-kargs.service. Dec 13 01:47:56.018358 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 01:47:56.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.018396 systemd[1]: Stopped ignition-setup.service. Dec 13 01:47:56.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.019354 systemd[1]: Stopping iscsiuio.service... Dec 13 01:47:56.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.022018 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 01:47:56.022097 systemd[1]: Stopped iscsiuio.service. Dec 13 01:47:56.023496 systemd[1]: Stopped target network.target. Dec 13 01:47:56.024898 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 01:47:56.024925 systemd[1]: Closed iscsiuio.socket. Dec 13 01:47:56.025712 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:47:56.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.027317 systemd[1]: Stopping systemd-resolved.service... Dec 13 01:47:56.031551 systemd-networkd[725]: eth0: DHCPv6 lease lost Dec 13 01:47:56.054000 audit: BPF prog-id=9 op=UNLOAD Dec 13 01:47:56.032931 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:47:56.033029 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:47:56.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.035694 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 01:47:56.035764 systemd[1]: Stopped systemd-resolved.service. Dec 13 01:47:56.039501 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 01:47:56.039536 systemd[1]: Closed systemd-networkd.socket. Dec 13 01:47:56.041747 systemd[1]: Stopping network-cleanup.service... Dec 13 01:47:56.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.042491 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 01:47:56.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.042561 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 01:47:56.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.044334 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 01:47:56.044363 systemd[1]: Stopped systemd-sysctl.service. Dec 13 01:47:56.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.046004 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 01:47:56.046035 systemd[1]: Stopped systemd-modules-load.service. Dec 13 01:47:56.047607 systemd[1]: Stopping systemd-udevd.service... Dec 13 01:47:56.050132 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 01:47:56.052633 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 01:47:56.052709 systemd[1]: Stopped network-cleanup.service. Dec 13 01:47:56.057612 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 01:47:56.057718 systemd[1]: Stopped systemd-udevd.service. Dec 13 01:47:56.060284 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 01:47:56.060313 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 01:47:56.061829 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 01:47:56.061853 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 01:47:56.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.063531 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 01:47:56.063562 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 01:47:56.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.064998 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 01:47:56.065026 systemd[1]: Stopped dracut-cmdline.service. Dec 13 01:47:56.066593 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 01:47:56.066622 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 01:47:56.068177 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 01:47:56.069640 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 01:47:56.069677 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 01:47:56.072464 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 01:47:56.072555 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 01:47:56.083700 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 01:47:56.083775 systemd[1]: Stopped sysroot-boot.service. Dec 13 01:47:56.085024 systemd[1]: Reached target initrd-switch-root.target. Dec 13 01:47:56.086499 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 01:47:56.086568 systemd[1]: Stopped initrd-setup-root.service. Dec 13 01:47:56.088850 systemd[1]: Starting initrd-switch-root.service... Dec 13 01:47:56.104323 systemd[1]: Switching root. Dec 13 01:47:56.122099 systemd-journald[199]: Journal stopped Dec 13 01:47:58.660309 systemd-journald[199]: Received SIGTERM from PID 1 (systemd). Dec 13 01:47:58.660367 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 01:47:58.660380 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 01:47:58.660391 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 01:47:58.660400 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 01:47:58.660410 kernel: SELinux: policy capability open_perms=1 Dec 13 01:47:58.660419 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 01:47:58.660428 kernel: SELinux: policy capability always_check_network=0 Dec 13 01:47:58.660438 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 01:47:58.660447 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 01:47:58.660456 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 01:47:58.660467 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 01:47:58.660476 systemd[1]: Successfully loaded SELinux policy in 38.118ms. Dec 13 01:47:58.660493 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.407ms. Dec 13 01:47:58.660504 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:47:58.660527 systemd[1]: Detected virtualization kvm. Dec 13 01:47:58.660537 systemd[1]: Detected architecture x86-64. Dec 13 01:47:58.660548 systemd[1]: Detected first boot. Dec 13 01:47:58.660558 systemd[1]: Initializing machine ID from VM UUID. Dec 13 01:47:58.660569 kernel: kauditd_printk_skb: 64 callbacks suppressed Dec 13 01:47:58.660581 kernel: audit: type=1400 audit(1734054476.470:75): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:47:58.660592 kernel: audit: type=1400 audit(1734054476.470:76): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:47:58.660603 kernel: audit: type=1334 audit(1734054476.474:77): prog-id=10 op=LOAD Dec 13 01:47:58.660612 kernel: audit: type=1334 audit(1734054476.474:78): prog-id=10 op=UNLOAD Dec 13 01:47:58.660621 kernel: audit: type=1334 audit(1734054476.478:79): prog-id=11 op=LOAD Dec 13 01:47:58.660630 kernel: audit: type=1334 audit(1734054476.478:80): prog-id=11 op=UNLOAD Dec 13 01:47:58.660640 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 01:47:58.660652 kernel: audit: type=1400 audit(1734054476.505:81): avc: denied { associate } for pid=912 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:47:58.660663 kernel: audit: type=1300 audit(1734054476.505:81): arch=c000003e syscall=188 success=yes exit=0 a0=c0001558b2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=895 pid=912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:58.660673 kernel: audit: type=1327 audit(1734054476.505:81): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:47:58.660683 kernel: audit: type=1400 audit(1734054476.506:82): avc: denied { associate } for pid=912 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:47:58.660693 systemd[1]: Populated /etc with preset unit settings. Dec 13 01:47:58.660706 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:47:58.660716 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:47:58.660729 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:47:58.660740 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 01:47:58.660750 systemd[1]: Stopped initrd-switch-root.service. Dec 13 01:47:58.660762 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 01:47:58.660772 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 01:47:58.660782 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 01:47:58.660792 systemd[1]: Created slice system-getty.slice. Dec 13 01:47:58.660802 systemd[1]: Created slice system-modprobe.slice. Dec 13 01:47:58.660812 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 01:47:58.660827 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 01:47:58.660837 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 01:47:58.660847 systemd[1]: Created slice user.slice. Dec 13 01:47:58.660858 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:47:58.660868 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 01:47:58.660878 systemd[1]: Set up automount boot.automount. Dec 13 01:47:58.660888 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 01:47:58.660898 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 01:47:58.660908 systemd[1]: Stopped target initrd-fs.target. Dec 13 01:47:58.660918 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 01:47:58.660928 systemd[1]: Reached target integritysetup.target. Dec 13 01:47:58.660940 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:47:58.660950 systemd[1]: Reached target remote-fs.target. Dec 13 01:47:58.660959 systemd[1]: Reached target slices.target. Dec 13 01:47:58.660970 systemd[1]: Reached target swap.target. Dec 13 01:47:58.660980 systemd[1]: Reached target torcx.target. Dec 13 01:47:58.660991 systemd[1]: Reached target veritysetup.target. Dec 13 01:47:58.661001 systemd[1]: Listening on systemd-coredump.socket. Dec 13 01:47:58.661011 systemd[1]: Listening on systemd-initctl.socket. Dec 13 01:47:58.661021 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:47:58.661032 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:47:58.661042 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:47:58.661052 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 01:47:58.661062 systemd[1]: Mounting dev-hugepages.mount... Dec 13 01:47:58.661072 systemd[1]: Mounting dev-mqueue.mount... Dec 13 01:47:58.661082 systemd[1]: Mounting media.mount... Dec 13 01:47:58.661092 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:58.661102 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 01:47:58.661112 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 01:47:58.661123 systemd[1]: Mounting tmp.mount... Dec 13 01:47:58.661133 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 01:47:58.661143 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:47:58.661153 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:47:58.661163 systemd[1]: Starting modprobe@configfs.service... Dec 13 01:47:58.661173 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:47:58.661183 systemd[1]: Starting modprobe@drm.service... Dec 13 01:47:58.661193 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:47:58.661203 systemd[1]: Starting modprobe@fuse.service... Dec 13 01:47:58.661215 systemd[1]: Starting modprobe@loop.service... Dec 13 01:47:58.661226 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 01:47:58.661236 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 01:47:58.661246 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 01:47:58.661256 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 01:47:58.661266 kernel: loop: module loaded Dec 13 01:47:58.661275 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 01:47:58.661285 systemd[1]: Stopped systemd-journald.service. Dec 13 01:47:58.661295 kernel: fuse: init (API version 7.34) Dec 13 01:47:58.661306 systemd[1]: Starting systemd-journald.service... Dec 13 01:47:58.661323 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:47:58.661333 systemd[1]: Starting systemd-network-generator.service... Dec 13 01:47:58.661344 systemd[1]: Starting systemd-remount-fs.service... Dec 13 01:47:58.661354 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:47:58.661364 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 01:47:58.661374 systemd[1]: Stopped verity-setup.service. Dec 13 01:47:58.661384 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:58.661394 systemd[1]: Mounted dev-hugepages.mount. Dec 13 01:47:58.661406 systemd[1]: Mounted dev-mqueue.mount. Dec 13 01:47:58.661420 systemd-journald[993]: Journal started Dec 13 01:47:58.661455 systemd-journald[993]: Runtime Journal (/run/log/journal/0edf7384bf4e4a69bb6ed895eafaf61e) is 6.0M, max 48.4M, 42.4M free. Dec 13 01:47:56.178000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:47:56.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:47:56.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:47:56.474000 audit: BPF prog-id=10 op=LOAD Dec 13 01:47:56.474000 audit: BPF prog-id=10 op=UNLOAD Dec 13 01:47:56.478000 audit: BPF prog-id=11 op=LOAD Dec 13 01:47:56.478000 audit: BPF prog-id=11 op=UNLOAD Dec 13 01:47:56.505000 audit[912]: AVC avc: denied { associate } for pid=912 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:47:56.505000 audit[912]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558b2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=895 pid=912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:56.505000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:47:56.506000 audit[912]: AVC avc: denied { associate } for pid=912 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:47:56.506000 audit[912]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155989 a2=1ed a3=0 items=2 ppid=895 pid=912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:56.506000 audit: CWD cwd="/" Dec 13 01:47:56.506000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:56.506000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:56.506000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:47:58.535000 audit: BPF prog-id=12 op=LOAD Dec 13 01:47:58.535000 audit: BPF prog-id=3 op=UNLOAD Dec 13 01:47:58.535000 audit: BPF prog-id=13 op=LOAD Dec 13 01:47:58.535000 audit: BPF prog-id=14 op=LOAD Dec 13 01:47:58.535000 audit: BPF prog-id=4 op=UNLOAD Dec 13 01:47:58.535000 audit: BPF prog-id=5 op=UNLOAD Dec 13 01:47:58.535000 audit: BPF prog-id=15 op=LOAD Dec 13 01:47:58.535000 audit: BPF prog-id=12 op=UNLOAD Dec 13 01:47:58.536000 audit: BPF prog-id=16 op=LOAD Dec 13 01:47:58.536000 audit: BPF prog-id=17 op=LOAD Dec 13 01:47:58.536000 audit: BPF prog-id=13 op=UNLOAD Dec 13 01:47:58.536000 audit: BPF prog-id=14 op=UNLOAD Dec 13 01:47:58.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.548000 audit: BPF prog-id=15 op=UNLOAD Dec 13 01:47:58.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.640000 audit: BPF prog-id=18 op=LOAD Dec 13 01:47:58.640000 audit: BPF prog-id=19 op=LOAD Dec 13 01:47:58.640000 audit: BPF prog-id=20 op=LOAD Dec 13 01:47:58.640000 audit: BPF prog-id=16 op=UNLOAD Dec 13 01:47:58.640000 audit: BPF prog-id=17 op=UNLOAD Dec 13 01:47:58.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.658000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 01:47:58.658000 audit[993]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe0f007630 a2=4000 a3=7ffe0f0076cc items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:58.658000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 01:47:58.533932 systemd[1]: Queued start job for default target multi-user.target. Dec 13 01:47:56.503932 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:47:58.533943 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 01:47:56.504120 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:47:58.536993 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 01:47:56.504136 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:47:56.504160 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 01:47:56.504170 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 01:47:56.504198 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 01:47:56.504209 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 01:47:56.504383 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 01:47:56.504415 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:47:56.504426 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:47:58.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:56.505065 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 01:47:58.663546 systemd[1]: Started systemd-journald.service. Dec 13 01:47:56.505095 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 01:47:56.505111 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 01:47:58.663699 systemd[1]: Mounted media.mount. Dec 13 01:47:56.505124 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 01:47:56.505138 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 01:47:56.505150 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 01:47:58.285102 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:58Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:47:58.285345 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:58Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:47:58.285422 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:58Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:47:58.285572 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:58Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:47:58.285616 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:58Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 01:47:58.285666 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T01:47:58Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 01:47:58.664525 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 01:47:58.665349 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 01:47:58.666459 systemd[1]: Mounted tmp.mount. Dec 13 01:47:58.667623 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:47:58.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.668704 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 01:47:58.668881 systemd[1]: Finished modprobe@configfs.service. Dec 13 01:47:58.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.669988 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 01:47:58.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.670953 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:47:58.671124 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:47:58.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.672098 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:47:58.672249 systemd[1]: Finished modprobe@drm.service. Dec 13 01:47:58.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.673192 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:47:58.673360 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:47:58.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.674380 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 01:47:58.674550 systemd[1]: Finished modprobe@fuse.service. Dec 13 01:47:58.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.675498 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:47:58.675680 systemd[1]: Finished modprobe@loop.service. Dec 13 01:47:58.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.676702 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:47:58.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.677893 systemd[1]: Finished systemd-network-generator.service. Dec 13 01:47:58.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.679215 systemd[1]: Finished systemd-remount-fs.service. Dec 13 01:47:58.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.680396 systemd[1]: Reached target network-pre.target. Dec 13 01:47:58.682129 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 01:47:58.683694 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 01:47:58.684398 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 01:47:58.685380 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 01:47:58.686980 systemd[1]: Starting systemd-journal-flush.service... Dec 13 01:47:58.687865 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:47:58.688887 systemd[1]: Starting systemd-random-seed.service... Dec 13 01:47:58.689692 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:47:58.690905 systemd-journald[993]: Time spent on flushing to /var/log/journal/0edf7384bf4e4a69bb6ed895eafaf61e is 14.538ms for 1159 entries. Dec 13 01:47:58.690905 systemd-journald[993]: System Journal (/var/log/journal/0edf7384bf4e4a69bb6ed895eafaf61e) is 8.0M, max 195.6M, 187.6M free. Dec 13 01:47:58.717876 systemd-journald[993]: Received client request to flush runtime journal. Dec 13 01:47:58.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.693161 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:47:58.696830 systemd[1]: Starting systemd-sysusers.service... Dec 13 01:47:58.699639 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 01:47:58.718921 udevadm[1016]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 01:47:58.700705 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 01:47:58.702108 systemd[1]: Finished systemd-random-seed.service. Dec 13 01:47:58.703103 systemd[1]: Reached target first-boot-complete.target. Dec 13 01:47:58.706192 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:47:58.707871 systemd[1]: Starting systemd-udev-settle.service... Dec 13 01:47:58.714980 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:47:58.718586 systemd[1]: Finished systemd-journal-flush.service. Dec 13 01:47:58.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.723452 systemd[1]: Finished systemd-sysusers.service. Dec 13 01:47:58.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.143196 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 01:47:59.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.144000 audit: BPF prog-id=21 op=LOAD Dec 13 01:47:59.144000 audit: BPF prog-id=22 op=LOAD Dec 13 01:47:59.144000 audit: BPF prog-id=7 op=UNLOAD Dec 13 01:47:59.144000 audit: BPF prog-id=8 op=UNLOAD Dec 13 01:47:59.145535 systemd[1]: Starting systemd-udevd.service... Dec 13 01:47:59.160776 systemd-udevd[1018]: Using default interface naming scheme 'v252'. Dec 13 01:47:59.173407 systemd[1]: Started systemd-udevd.service. Dec 13 01:47:59.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.175000 audit: BPF prog-id=23 op=LOAD Dec 13 01:47:59.177136 systemd[1]: Starting systemd-networkd.service... Dec 13 01:47:59.181000 audit: BPF prog-id=24 op=LOAD Dec 13 01:47:59.181000 audit: BPF prog-id=25 op=LOAD Dec 13 01:47:59.181000 audit: BPF prog-id=26 op=LOAD Dec 13 01:47:59.182853 systemd[1]: Starting systemd-userdbd.service... Dec 13 01:47:59.215725 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 01:47:59.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.221623 systemd[1]: Started systemd-userdbd.service. Dec 13 01:47:59.247845 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:47:59.244000 audit[1037]: AVC avc: denied { confidentiality } for pid=1037 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:47:59.244000 audit[1037]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5592b2ac2b40 a1=337fc a2=7f594e450bc5 a3=5 items=110 ppid=1018 pid=1037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:59.244000 audit: CWD cwd="/" Dec 13 01:47:59.244000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=1 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=2 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=3 name=(null) inode=15699 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=4 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=5 name=(null) inode=15700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=6 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=7 name=(null) inode=15701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=8 name=(null) inode=15701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=9 name=(null) inode=15702 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=10 name=(null) inode=15701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=11 name=(null) inode=15703 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=12 name=(null) inode=15701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=13 name=(null) inode=15704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=14 name=(null) inode=15701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=15 name=(null) inode=15705 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=16 name=(null) inode=15701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=17 name=(null) inode=15706 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=18 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=19 name=(null) inode=15707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=20 name=(null) inode=15707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=21 name=(null) inode=15708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=22 name=(null) inode=15707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=23 name=(null) inode=15709 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=24 name=(null) inode=15707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=25 name=(null) inode=15710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=26 name=(null) inode=15707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=27 name=(null) inode=15711 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=28 name=(null) inode=15707 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=29 name=(null) inode=15712 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=30 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=31 name=(null) inode=15713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=32 name=(null) inode=15713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=33 name=(null) inode=15714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=34 name=(null) inode=15713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=35 name=(null) inode=15715 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=36 name=(null) inode=15713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=37 name=(null) inode=15716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=38 name=(null) inode=15713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=39 name=(null) inode=15717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=40 name=(null) inode=15713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=41 name=(null) inode=15718 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=42 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=43 name=(null) inode=15719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=44 name=(null) inode=15719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=45 name=(null) inode=15720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=46 name=(null) inode=15719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=47 name=(null) inode=15721 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=48 name=(null) inode=15719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=49 name=(null) inode=15722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=50 name=(null) inode=15719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=51 name=(null) inode=15723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=52 name=(null) inode=15719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=53 name=(null) inode=15724 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=55 name=(null) inode=15725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=56 name=(null) inode=15725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=57 name=(null) inode=15726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=58 name=(null) inode=15725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=59 name=(null) inode=15727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=60 name=(null) inode=15725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=61 name=(null) inode=15728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=62 name=(null) inode=15728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=63 name=(null) inode=15729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=64 name=(null) inode=15728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=65 name=(null) inode=15730 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=66 name=(null) inode=15728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=67 name=(null) inode=15731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=68 name=(null) inode=15728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=69 name=(null) inode=15732 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=70 name=(null) inode=15728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=71 name=(null) inode=15733 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=72 name=(null) inode=15725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=73 name=(null) inode=15734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=74 name=(null) inode=15734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=75 name=(null) inode=15735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=76 name=(null) inode=15734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=77 name=(null) inode=15736 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=78 name=(null) inode=15734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=79 name=(null) inode=15737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=80 name=(null) inode=15734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=81 name=(null) inode=15738 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=82 name=(null) inode=15734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=83 name=(null) inode=15739 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=84 name=(null) inode=15725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=85 name=(null) inode=15740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=86 name=(null) inode=15740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=87 name=(null) inode=15741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=88 name=(null) inode=15740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=89 name=(null) inode=15742 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=90 name=(null) inode=15740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=91 name=(null) inode=15743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=92 name=(null) inode=15740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=93 name=(null) inode=15744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=94 name=(null) inode=15740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=95 name=(null) inode=15745 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=96 name=(null) inode=15725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=97 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=98 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=99 name=(null) inode=15747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=100 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=101 name=(null) inode=15748 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=102 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=103 name=(null) inode=15749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=104 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=105 name=(null) inode=15750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=106 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=107 name=(null) inode=15751 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PATH item=109 name=(null) inode=13155 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:59.244000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 01:47:59.280559 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 01:47:59.292879 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 01:47:59.292999 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 01:47:59.293107 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 01:47:59.293196 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 01:47:59.293211 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 01:47:59.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.282175 systemd-networkd[1028]: lo: Link UP Dec 13 01:47:59.282180 systemd-networkd[1028]: lo: Gained carrier Dec 13 01:47:59.282582 systemd-networkd[1028]: Enumeration completed Dec 13 01:47:59.282672 systemd[1]: Started systemd-networkd.service. Dec 13 01:47:59.284680 systemd-networkd[1028]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:47:59.285644 systemd-networkd[1028]: eth0: Link UP Dec 13 01:47:59.285647 systemd-networkd[1028]: eth0: Gained carrier Dec 13 01:47:59.297539 kernel: ACPI: button: Power Button [PWRF] Dec 13 01:47:59.305362 systemd-networkd[1028]: eth0: DHCPv4 address 10.0.0.22/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 01:47:59.306586 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 01:47:59.344005 kernel: kvm: Nested Virtualization enabled Dec 13 01:47:59.344060 kernel: SVM: kvm: Nested Paging enabled Dec 13 01:47:59.344075 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 01:47:59.344087 kernel: SVM: Virtual GIF supported Dec 13 01:47:59.359548 kernel: EDAC MC: Ver: 3.0.0 Dec 13 01:47:59.386884 systemd[1]: Finished systemd-udev-settle.service. Dec 13 01:47:59.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.388845 systemd[1]: Starting lvm2-activation-early.service... Dec 13 01:47:59.395946 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:47:59.420363 systemd[1]: Finished lvm2-activation-early.service. Dec 13 01:47:59.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.421385 systemd[1]: Reached target cryptsetup.target. Dec 13 01:47:59.423193 systemd[1]: Starting lvm2-activation.service... Dec 13 01:47:59.426603 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:47:59.451378 systemd[1]: Finished lvm2-activation.service. Dec 13 01:47:59.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.452309 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:47:59.453154 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 01:47:59.453176 systemd[1]: Reached target local-fs.target. Dec 13 01:47:59.453976 systemd[1]: Reached target machines.target. Dec 13 01:47:59.455716 systemd[1]: Starting ldconfig.service... Dec 13 01:47:59.456682 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:47:59.456722 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:59.457504 systemd[1]: Starting systemd-boot-update.service... Dec 13 01:47:59.459106 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 01:47:59.461318 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 01:47:59.463175 systemd[1]: Starting systemd-sysext.service... Dec 13 01:47:59.466065 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) Dec 13 01:47:59.466984 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 01:47:59.471986 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 01:47:59.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.474987 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 01:47:59.478775 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 01:47:59.478903 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 01:47:59.488547 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 01:47:59.704229 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 01:47:59.706962 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 01:47:59.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.706616 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 01:47:59.707123 systemd-fsck[1066]: fsck.fat 4.2 (2021-01-31) Dec 13 01:47:59.707123 systemd-fsck[1066]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 01:47:59.709108 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 01:47:59.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.711653 systemd[1]: Mounting boot.mount... Dec 13 01:47:59.718236 systemd[1]: Mounted boot.mount. Dec 13 01:47:59.726538 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 01:47:59.729198 systemd[1]: Finished systemd-boot-update.service. Dec 13 01:47:59.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.730558 (sd-sysext)[1071]: Using extensions 'kubernetes'. Dec 13 01:47:59.730941 (sd-sysext)[1071]: Merged extensions into '/usr'. Dec 13 01:47:59.748909 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:59.750469 systemd[1]: Mounting usr-share-oem.mount... Dec 13 01:47:59.751425 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:47:59.752831 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:47:59.754892 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:47:59.757023 systemd[1]: Starting modprobe@loop.service... Dec 13 01:47:59.757857 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:47:59.757998 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:59.758114 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:59.761107 systemd[1]: Mounted usr-share-oem.mount. Dec 13 01:47:59.762278 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:47:59.762437 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:47:59.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.763796 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:47:59.763939 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:47:59.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.765267 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:47:59.765418 systemd[1]: Finished modprobe@loop.service. Dec 13 01:47:59.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.766777 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:47:59.766901 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:47:59.767951 systemd[1]: Finished systemd-sysext.service. Dec 13 01:47:59.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.770163 systemd[1]: Starting ensure-sysext.service... Dec 13 01:47:59.772146 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 01:47:59.778170 systemd[1]: Reloading. Dec 13 01:47:59.786542 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 01:47:59.786372 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 01:47:59.790136 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 01:47:59.793132 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 01:47:59.830347 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-12-13T01:47:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:47:59.830371 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-12-13T01:47:59Z" level=info msg="torcx already run" Dec 13 01:47:59.891397 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:47:59.891413 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:47:59.908258 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:47:59.959000 audit: BPF prog-id=27 op=LOAD Dec 13 01:47:59.959000 audit: BPF prog-id=23 op=UNLOAD Dec 13 01:47:59.961000 audit: BPF prog-id=28 op=LOAD Dec 13 01:47:59.961000 audit: BPF prog-id=29 op=LOAD Dec 13 01:47:59.961000 audit: BPF prog-id=21 op=UNLOAD Dec 13 01:47:59.961000 audit: BPF prog-id=22 op=UNLOAD Dec 13 01:47:59.961000 audit: BPF prog-id=30 op=LOAD Dec 13 01:47:59.961000 audit: BPF prog-id=24 op=UNLOAD Dec 13 01:47:59.962000 audit: BPF prog-id=31 op=LOAD Dec 13 01:47:59.962000 audit: BPF prog-id=32 op=LOAD Dec 13 01:47:59.962000 audit: BPF prog-id=25 op=UNLOAD Dec 13 01:47:59.962000 audit: BPF prog-id=26 op=UNLOAD Dec 13 01:47:59.962000 audit: BPF prog-id=33 op=LOAD Dec 13 01:47:59.962000 audit: BPF prog-id=18 op=UNLOAD Dec 13 01:47:59.962000 audit: BPF prog-id=34 op=LOAD Dec 13 01:47:59.962000 audit: BPF prog-id=35 op=LOAD Dec 13 01:47:59.962000 audit: BPF prog-id=19 op=UNLOAD Dec 13 01:47:59.962000 audit: BPF prog-id=20 op=UNLOAD Dec 13 01:47:59.965702 systemd[1]: Finished ldconfig.service. Dec 13 01:47:59.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.967679 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 01:47:59.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.970980 systemd[1]: Starting audit-rules.service... Dec 13 01:47:59.972813 systemd[1]: Starting clean-ca-certificates.service... Dec 13 01:47:59.975000 audit: BPF prog-id=36 op=LOAD Dec 13 01:47:59.977000 audit: BPF prog-id=37 op=LOAD Dec 13 01:47:59.974667 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 01:47:59.977107 systemd[1]: Starting systemd-resolved.service... Dec 13 01:47:59.979130 systemd[1]: Starting systemd-timesyncd.service... Dec 13 01:47:59.980823 systemd[1]: Starting systemd-update-utmp.service... Dec 13 01:47:59.982090 systemd[1]: Finished clean-ca-certificates.service. Dec 13 01:47:59.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.984000 audit[1150]: SYSTEM_BOOT pid=1150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.984811 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:47:59.989674 systemd[1]: Finished systemd-update-utmp.service. Dec 13 01:47:59.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.991557 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:59.991729 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:47:59.992817 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:47:59.994678 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:47:59.996396 systemd[1]: Starting modprobe@loop.service... Dec 13 01:47:59.997249 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:47:59.997358 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:59.997442 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:47:59.997504 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:59.998502 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 01:47:59.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.000048 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:48:00.000154 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:48:00.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.001358 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:48:00.001452 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:48:00.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.002763 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:48:00.002855 systemd[1]: Finished modprobe@loop.service. Dec 13 01:48:00.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.004979 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:48:00.005146 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:48:00.006270 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:48:00.008480 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:48:00.010159 systemd[1]: Starting modprobe@loop.service... Dec 13 01:48:00.010958 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:48:00.011060 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:48:00.012173 systemd[1]: Starting systemd-update-done.service... Dec 13 01:48:00.013110 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:48:00.013189 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:48:00.013992 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:48:00.014091 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:48:00.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.015432 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:48:00.015579 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:48:00.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.016900 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:48:00.017030 systemd[1]: Finished modprobe@loop.service. Dec 13 01:48:00.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.018321 systemd[1]: Finished systemd-update-done.service. Dec 13 01:48:00.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:00.019664 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:48:00.019785 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:48:00.020000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:48:00.020000 audit[1162]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff50110c70 a2=420 a3=0 items=0 ppid=1139 pid=1162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:00.020000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 01:48:00.020849 augenrules[1162]: No rules Dec 13 01:48:00.022927 systemd[1]: Finished audit-rules.service. Dec 13 01:48:00.023975 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:48:00.024159 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:48:00.025186 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:48:00.027062 systemd[1]: Starting modprobe@drm.service... Dec 13 01:48:00.028898 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:48:00.030566 systemd[1]: Starting modprobe@loop.service... Dec 13 01:48:00.031392 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:48:00.031492 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:48:00.032646 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:48:00.033722 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:48:00.033823 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:48:00.034195 systemd-resolved[1145]: Positive Trust Anchors: Dec 13 01:48:00.034205 systemd-resolved[1145]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:48:00.034232 systemd-resolved[1145]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:48:00.034653 systemd[1]: Started systemd-timesyncd.service. Dec 13 01:48:00.036131 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:48:00.036232 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:48:00.037160 systemd-timesyncd[1147]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 01:48:00.037205 systemd-timesyncd[1147]: Initial clock synchronization to Fri 2024-12-13 01:48:00.373538 UTC. Dec 13 01:48:00.037610 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:48:00.037708 systemd[1]: Finished modprobe@drm.service. Dec 13 01:48:00.038913 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:48:00.039009 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:48:00.040363 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:48:00.040460 systemd[1]: Finished modprobe@loop.service. Dec 13 01:48:00.041817 systemd[1]: Reached target time-set.target. Dec 13 01:48:00.042817 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:48:00.042847 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:48:00.043081 systemd[1]: Finished ensure-sysext.service. Dec 13 01:48:00.044113 systemd-resolved[1145]: Defaulting to hostname 'linux'. Dec 13 01:48:00.045529 systemd[1]: Started systemd-resolved.service. Dec 13 01:48:00.046399 systemd[1]: Reached target network.target. Dec 13 01:48:00.047289 systemd[1]: Reached target nss-lookup.target. Dec 13 01:48:00.048121 systemd[1]: Reached target sysinit.target. Dec 13 01:48:00.048977 systemd[1]: Started motdgen.path. Dec 13 01:48:00.049775 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 01:48:00.050990 systemd[1]: Started logrotate.timer. Dec 13 01:48:00.051795 systemd[1]: Started mdadm.timer. Dec 13 01:48:00.052504 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 01:48:00.053381 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 01:48:00.053401 systemd[1]: Reached target paths.target. Dec 13 01:48:00.054208 systemd[1]: Reached target timers.target. Dec 13 01:48:00.055254 systemd[1]: Listening on dbus.socket. Dec 13 01:48:00.056790 systemd[1]: Starting docker.socket... Dec 13 01:48:00.059524 systemd[1]: Listening on sshd.socket. Dec 13 01:48:00.060366 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:48:00.060682 systemd[1]: Listening on docker.socket. Dec 13 01:48:00.061505 systemd[1]: Reached target sockets.target. Dec 13 01:48:00.062311 systemd[1]: Reached target basic.target. Dec 13 01:48:00.063120 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:48:00.063142 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:48:00.063915 systemd[1]: Starting containerd.service... Dec 13 01:48:00.065489 systemd[1]: Starting dbus.service... Dec 13 01:48:00.066991 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 01:48:00.068775 systemd[1]: Starting extend-filesystems.service... Dec 13 01:48:00.069782 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 01:48:00.070638 systemd[1]: Starting motdgen.service... Dec 13 01:48:00.071071 jq[1181]: false Dec 13 01:48:00.072320 systemd[1]: Starting prepare-helm.service... Dec 13 01:48:00.074224 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 01:48:00.075946 systemd[1]: Starting sshd-keygen.service... Dec 13 01:48:00.078705 systemd[1]: Starting systemd-logind.service... Dec 13 01:48:00.079753 extend-filesystems[1182]: Found loop1 Dec 13 01:48:00.081012 extend-filesystems[1182]: Found sr0 Dec 13 01:48:00.081012 extend-filesystems[1182]: Found vda Dec 13 01:48:00.081012 extend-filesystems[1182]: Found vda1 Dec 13 01:48:00.081012 extend-filesystems[1182]: Found vda2 Dec 13 01:48:00.081012 extend-filesystems[1182]: Found vda3 Dec 13 01:48:00.081012 extend-filesystems[1182]: Found usr Dec 13 01:48:00.081012 extend-filesystems[1182]: Found vda4 Dec 13 01:48:00.081012 extend-filesystems[1182]: Found vda6 Dec 13 01:48:00.081012 extend-filesystems[1182]: Found vda7 Dec 13 01:48:00.081012 extend-filesystems[1182]: Found vda9 Dec 13 01:48:00.081012 extend-filesystems[1182]: Checking size of /dev/vda9 Dec 13 01:48:00.118719 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 01:48:00.121971 extend-filesystems[1182]: Resized partition /dev/vda9 Dec 13 01:48:00.102206 dbus-daemon[1180]: [system] SELinux support is enabled Dec 13 01:48:00.082398 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:48:00.127684 extend-filesystems[1211]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 01:48:00.082445 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 01:48:00.146245 update_engine[1200]: I1213 01:48:00.132937 1200 main.cc:92] Flatcar Update Engine starting Dec 13 01:48:00.146245 update_engine[1200]: I1213 01:48:00.136968 1200 update_check_scheduler.cc:74] Next update check in 5m43s Dec 13 01:48:00.082765 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 01:48:00.146680 jq[1202]: true Dec 13 01:48:00.084781 systemd[1]: Starting update-engine.service... Dec 13 01:48:00.087564 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 01:48:00.147737 tar[1205]: linux-amd64/helm Dec 13 01:48:00.090478 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 01:48:00.091611 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 01:48:00.148610 jq[1209]: true Dec 13 01:48:00.092538 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 01:48:00.092668 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 01:48:00.149643 env[1206]: time="2024-12-13T01:48:00.149364325Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 01:48:00.102543 systemd[1]: Started dbus.service. Dec 13 01:48:00.107560 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 01:48:00.107579 systemd[1]: Reached target system-config.target. Dec 13 01:48:00.108686 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 01:48:00.108699 systemd[1]: Reached target user-config.target. Dec 13 01:48:00.115906 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 01:48:00.126945 systemd[1]: Finished motdgen.service. Dec 13 01:48:00.136903 systemd[1]: Started update-engine.service. Dec 13 01:48:00.139340 systemd[1]: Started locksmithd.service. Dec 13 01:48:00.156952 systemd-logind[1192]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 01:48:00.156973 systemd-logind[1192]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 01:48:00.157544 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 01:48:00.157651 systemd-logind[1192]: New seat seat0. Dec 13 01:48:00.159409 systemd[1]: Started systemd-logind.service. Dec 13 01:48:00.168326 env[1206]: time="2024-12-13T01:48:00.168284183Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 01:48:00.181265 env[1206]: time="2024-12-13T01:48:00.181038236Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182245801Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182280647Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182477426Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182490630Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182501521Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182510107Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182584827Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182760426Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182865684Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:48:00.183042 env[1206]: time="2024-12-13T01:48:00.182877546Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 01:48:00.183347 env[1206]: time="2024-12-13T01:48:00.182918403Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 01:48:00.183347 env[1206]: time="2024-12-13T01:48:00.182928923Z" level=info msg="metadata content store policy set" policy=shared Dec 13 01:48:00.183741 extend-filesystems[1211]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 01:48:00.183741 extend-filesystems[1211]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 01:48:00.183741 extend-filesystems[1211]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 01:48:00.188240 extend-filesystems[1182]: Resized filesystem in /dev/vda9 Dec 13 01:48:00.184988 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 01:48:00.185135 systemd[1]: Finished extend-filesystems.service. Dec 13 01:48:00.203698 locksmithd[1233]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 01:48:00.386076 bash[1232]: Updated "/home/core/.ssh/authorized_keys" Dec 13 01:48:00.386825 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 01:48:00.390457 env[1206]: time="2024-12-13T01:48:00.390409617Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 01:48:00.390556 env[1206]: time="2024-12-13T01:48:00.390479057Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 01:48:00.390556 env[1206]: time="2024-12-13T01:48:00.390502281Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 01:48:00.390620 env[1206]: time="2024-12-13T01:48:00.390585256Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 01:48:00.390620 env[1206]: time="2024-12-13T01:48:00.390606757Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 01:48:00.390722 env[1206]: time="2024-12-13T01:48:00.390698599Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 01:48:00.390788 env[1206]: time="2024-12-13T01:48:00.390734617Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 01:48:00.390788 env[1206]: time="2024-12-13T01:48:00.390758762Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 01:48:00.390788 env[1206]: time="2024-12-13T01:48:00.390774391Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 01:48:00.390871 env[1206]: time="2024-12-13T01:48:00.390791002Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 01:48:00.390871 env[1206]: time="2024-12-13T01:48:00.390832851Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 01:48:00.390871 env[1206]: time="2024-12-13T01:48:00.390850544Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 01:48:00.391020 env[1206]: time="2024-12-13T01:48:00.390988974Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391098148Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391423178Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391453786Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391467952Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391544606Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391563401Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391579702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391658059Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391677625Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391692814Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391706389Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391720716Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391737808Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391860959Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393403 env[1206]: time="2024-12-13T01:48:00.391879224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393803 env[1206]: time="2024-12-13T01:48:00.391895574Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393803 env[1206]: time="2024-12-13T01:48:00.391910272Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 01:48:00.393803 env[1206]: time="2024-12-13T01:48:00.391930480Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 01:48:00.393803 env[1206]: time="2024-12-13T01:48:00.391943935Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 01:48:00.393803 env[1206]: time="2024-12-13T01:48:00.391966477Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 01:48:00.393803 env[1206]: time="2024-12-13T01:48:00.392008125Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 01:48:00.393945 env[1206]: time="2024-12-13T01:48:00.392238848Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 01:48:00.393945 env[1206]: time="2024-12-13T01:48:00.392311825Z" level=info msg="Connect containerd service" Dec 13 01:48:00.393945 env[1206]: time="2024-12-13T01:48:00.392345949Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 01:48:00.395651 env[1206]: time="2024-12-13T01:48:00.395621533Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:48:00.395757 env[1206]: time="2024-12-13T01:48:00.395724987Z" level=info msg="Start subscribing containerd event" Dec 13 01:48:00.395820 env[1206]: time="2024-12-13T01:48:00.395779820Z" level=info msg="Start recovering state" Dec 13 01:48:00.395909 env[1206]: time="2024-12-13T01:48:00.395883675Z" level=info msg="Start event monitor" Dec 13 01:48:00.395972 env[1206]: time="2024-12-13T01:48:00.395910475Z" level=info msg="Start snapshots syncer" Dec 13 01:48:00.395972 env[1206]: time="2024-12-13T01:48:00.395927507Z" level=info msg="Start cni network conf syncer for default" Dec 13 01:48:00.395972 env[1206]: time="2024-12-13T01:48:00.395941423Z" level=info msg="Start streaming server" Dec 13 01:48:00.396595 env[1206]: time="2024-12-13T01:48:00.396576705Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 01:48:00.396731 env[1206]: time="2024-12-13T01:48:00.396710906Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 01:48:00.396882 systemd[1]: Started containerd.service. Dec 13 01:48:00.397914 env[1206]: time="2024-12-13T01:48:00.397424184Z" level=info msg="containerd successfully booted in 0.251387s" Dec 13 01:48:00.538702 tar[1205]: linux-amd64/LICENSE Dec 13 01:48:00.538850 tar[1205]: linux-amd64/README.md Dec 13 01:48:00.542391 systemd[1]: Finished prepare-helm.service. Dec 13 01:48:00.787970 sshd_keygen[1199]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 01:48:00.805278 systemd[1]: Finished sshd-keygen.service. Dec 13 01:48:00.807609 systemd[1]: Starting issuegen.service... Dec 13 01:48:00.812081 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 01:48:00.812192 systemd[1]: Finished issuegen.service. Dec 13 01:48:00.814011 systemd[1]: Starting systemd-user-sessions.service... Dec 13 01:48:00.818157 systemd[1]: Finished systemd-user-sessions.service. Dec 13 01:48:00.820018 systemd[1]: Started getty@tty1.service. Dec 13 01:48:00.821726 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 01:48:00.822763 systemd[1]: Reached target getty.target. Dec 13 01:48:01.226351 systemd-networkd[1028]: eth0: Gained IPv6LL Dec 13 01:48:01.228186 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:48:01.229593 systemd[1]: Reached target network-online.target. Dec 13 01:48:01.231796 systemd[1]: Starting kubelet.service... Dec 13 01:48:01.769381 systemd[1]: Started kubelet.service. Dec 13 01:48:01.770741 systemd[1]: Reached target multi-user.target. Dec 13 01:48:01.772942 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 01:48:01.779651 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 01:48:01.779786 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 01:48:01.781189 systemd[1]: Startup finished in 587ms (kernel) + 4.446s (initrd) + 5.642s (userspace) = 10.676s. Dec 13 01:48:02.229337 kubelet[1262]: E1213 01:48:02.229201 1262 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:02.230725 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:02.230834 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:10.203045 systemd[1]: Created slice system-sshd.slice. Dec 13 01:48:10.204322 systemd[1]: Started sshd@0-10.0.0.22:22-10.0.0.1:49702.service. Dec 13 01:48:10.236868 sshd[1272]: Accepted publickey for core from 10.0.0.1 port 49702 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:48:10.238550 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:10.248911 systemd-logind[1192]: New session 1 of user core. Dec 13 01:48:10.249741 systemd[1]: Created slice user-500.slice. Dec 13 01:48:10.250763 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 01:48:10.258425 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 01:48:10.259827 systemd[1]: Starting user@500.service... Dec 13 01:48:10.262447 (systemd)[1275]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:10.331346 systemd[1275]: Queued start job for default target default.target. Dec 13 01:48:10.331815 systemd[1275]: Reached target paths.target. Dec 13 01:48:10.331835 systemd[1275]: Reached target sockets.target. Dec 13 01:48:10.331847 systemd[1275]: Reached target timers.target. Dec 13 01:48:10.331858 systemd[1275]: Reached target basic.target. Dec 13 01:48:10.331892 systemd[1275]: Reached target default.target. Dec 13 01:48:10.331914 systemd[1275]: Startup finished in 63ms. Dec 13 01:48:10.332058 systemd[1]: Started user@500.service. Dec 13 01:48:10.333078 systemd[1]: Started session-1.scope. Dec 13 01:48:10.384477 systemd[1]: Started sshd@1-10.0.0.22:22-10.0.0.1:49708.service. Dec 13 01:48:10.417160 sshd[1284]: Accepted publickey for core from 10.0.0.1 port 49708 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:48:10.418350 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:10.422144 systemd-logind[1192]: New session 2 of user core. Dec 13 01:48:10.423389 systemd[1]: Started session-2.scope. Dec 13 01:48:10.476602 sshd[1284]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:10.479389 systemd[1]: sshd@1-10.0.0.22:22-10.0.0.1:49708.service: Deactivated successfully. Dec 13 01:48:10.479917 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 01:48:10.480484 systemd-logind[1192]: Session 2 logged out. Waiting for processes to exit. Dec 13 01:48:10.481485 systemd[1]: Started sshd@2-10.0.0.22:22-10.0.0.1:49718.service. Dec 13 01:48:10.482179 systemd-logind[1192]: Removed session 2. Dec 13 01:48:10.512721 sshd[1290]: Accepted publickey for core from 10.0.0.1 port 49718 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:48:10.513890 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:10.517138 systemd-logind[1192]: New session 3 of user core. Dec 13 01:48:10.517925 systemd[1]: Started session-3.scope. Dec 13 01:48:10.566809 sshd[1290]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:10.569598 systemd[1]: sshd@2-10.0.0.22:22-10.0.0.1:49718.service: Deactivated successfully. Dec 13 01:48:10.570095 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 01:48:10.570581 systemd-logind[1192]: Session 3 logged out. Waiting for processes to exit. Dec 13 01:48:10.571565 systemd[1]: Started sshd@3-10.0.0.22:22-10.0.0.1:49732.service. Dec 13 01:48:10.572093 systemd-logind[1192]: Removed session 3. Dec 13 01:48:10.600200 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 49732 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:48:10.601186 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:10.604314 systemd-logind[1192]: New session 4 of user core. Dec 13 01:48:10.605081 systemd[1]: Started session-4.scope. Dec 13 01:48:10.658131 sshd[1296]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:10.661878 systemd[1]: Started sshd@4-10.0.0.22:22-10.0.0.1:49740.service. Dec 13 01:48:10.662356 systemd[1]: sshd@3-10.0.0.22:22-10.0.0.1:49732.service: Deactivated successfully. Dec 13 01:48:10.662975 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 01:48:10.663458 systemd-logind[1192]: Session 4 logged out. Waiting for processes to exit. Dec 13 01:48:10.664225 systemd-logind[1192]: Removed session 4. Dec 13 01:48:10.692068 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 49740 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:48:10.693281 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:10.696601 systemd-logind[1192]: New session 5 of user core. Dec 13 01:48:10.697325 systemd[1]: Started session-5.scope. Dec 13 01:48:11.116483 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 01:48:11.116742 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:48:11.126755 dbus-daemon[1180]: \xd0m\x87\x83\xb2U: received setenforce notice (enforcing=1564583296) Dec 13 01:48:11.128783 sudo[1306]: pam_unix(sudo:session): session closed for user root Dec 13 01:48:11.130796 sshd[1302]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:11.133426 systemd[1]: sshd@4-10.0.0.22:22-10.0.0.1:49740.service: Deactivated successfully. Dec 13 01:48:11.133938 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 01:48:11.134473 systemd-logind[1192]: Session 5 logged out. Waiting for processes to exit. Dec 13 01:48:11.135398 systemd[1]: Started sshd@5-10.0.0.22:22-10.0.0.1:49752.service. Dec 13 01:48:11.136010 systemd-logind[1192]: Removed session 5. Dec 13 01:48:11.163657 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 49752 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:48:11.164855 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:11.168855 systemd-logind[1192]: New session 6 of user core. Dec 13 01:48:11.169932 systemd[1]: Started session-6.scope. Dec 13 01:48:11.223715 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 01:48:11.223911 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:48:11.226353 sudo[1314]: pam_unix(sudo:session): session closed for user root Dec 13 01:48:11.232110 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 01:48:11.232393 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:48:11.241383 systemd[1]: Stopping audit-rules.service... Dec 13 01:48:11.241000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:48:11.242658 auditctl[1317]: No rules Dec 13 01:48:11.243369 kernel: kauditd_printk_skb: 239 callbacks suppressed Dec 13 01:48:11.243407 kernel: audit: type=1305 audit(1734054491.241:200): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:48:11.243589 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 01:48:11.243718 systemd[1]: Stopped audit-rules.service. Dec 13 01:48:11.244924 systemd[1]: Starting audit-rules.service... Dec 13 01:48:11.241000 audit[1317]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd9e55cd0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:11.249657 kernel: audit: type=1300 audit(1734054491.241:200): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd9e55cd0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:11.249699 kernel: audit: type=1327 audit(1734054491.241:200): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:48:11.241000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:48:11.250963 kernel: audit: type=1131 audit(1734054491.243:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.262312 augenrules[1334]: No rules Dec 13 01:48:11.263001 systemd[1]: Finished audit-rules.service. Dec 13 01:48:11.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.263780 sudo[1313]: pam_unix(sudo:session): session closed for user root Dec 13 01:48:11.262000 audit[1313]: USER_END pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.266758 sshd[1310]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:11.269005 systemd[1]: sshd@5-10.0.0.22:22-10.0.0.1:49752.service: Deactivated successfully. Dec 13 01:48:11.269607 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 01:48:11.270107 kernel: audit: type=1130 audit(1734054491.261:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.270196 kernel: audit: type=1106 audit(1734054491.262:203): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.270230 kernel: audit: type=1104 audit(1734054491.262:204): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.262000 audit[1313]: CRED_DISP pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.270080 systemd-logind[1192]: Session 6 logged out. Waiting for processes to exit. Dec 13 01:48:11.273365 kernel: audit: type=1106 audit(1734054491.265:205): pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:11.265000 audit[1310]: USER_END pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:11.273472 systemd[1]: Started sshd@6-10.0.0.22:22-10.0.0.1:49756.service. Dec 13 01:48:11.274105 systemd-logind[1192]: Removed session 6. Dec 13 01:48:11.277592 kernel: audit: type=1104 audit(1734054491.266:206): pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:11.266000 audit[1310]: CRED_DISP pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:11.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.22:22-10.0.0.1:49752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.284428 kernel: audit: type=1131 audit(1734054491.267:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.22:22-10.0.0.1:49752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.22:22-10.0.0.1:49756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.304000 audit[1340]: USER_ACCT pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:11.305257 sshd[1340]: Accepted publickey for core from 10.0.0.1 port 49756 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:48:11.305000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:11.305000 audit[1340]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefe1a08c0 a2=3 a3=0 items=0 ppid=1 pid=1340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:11.305000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:48:11.306113 sshd[1340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:11.309291 systemd-logind[1192]: New session 7 of user core. Dec 13 01:48:11.310031 systemd[1]: Started session-7.scope. Dec 13 01:48:11.312000 audit[1340]: USER_START pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:11.314000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:11.360000 audit[1343]: USER_ACCT pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.362609 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 01:48:11.361000 audit[1343]: CRED_REFR pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.362861 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:48:11.362000 audit[1343]: USER_START pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:11.381831 systemd[1]: Starting docker.service... Dec 13 01:48:11.411669 env[1356]: time="2024-12-13T01:48:11.411627117Z" level=info msg="Starting up" Dec 13 01:48:11.413316 env[1356]: time="2024-12-13T01:48:11.413288620Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:48:11.413316 env[1356]: time="2024-12-13T01:48:11.413305932Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:48:11.413400 env[1356]: time="2024-12-13T01:48:11.413327002Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:48:11.413400 env[1356]: time="2024-12-13T01:48:11.413347291Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:48:11.418214 env[1356]: time="2024-12-13T01:48:11.418168846Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:48:11.418214 env[1356]: time="2024-12-13T01:48:11.418198404Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:48:11.418284 env[1356]: time="2024-12-13T01:48:11.418218238Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:48:11.418284 env[1356]: time="2024-12-13T01:48:11.418227557Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:48:11.423016 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport890292419-merged.mount: Deactivated successfully. Dec 13 01:48:11.938957 env[1356]: time="2024-12-13T01:48:11.938897954Z" level=info msg="Loading containers: start." Dec 13 01:48:11.986000 audit[1391]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:11.986000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdeb2a1fc0 a2=0 a3=7ffdeb2a1fac items=0 ppid=1356 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:11.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 01:48:11.987000 audit[1393]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:11.987000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe5a33bd20 a2=0 a3=7ffe5a33bd0c items=0 ppid=1356 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:11.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 01:48:11.989000 audit[1395]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:11.989000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcd2732a10 a2=0 a3=7ffcd27329fc items=0 ppid=1356 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:11.989000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:48:11.990000 audit[1397]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:11.990000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc17bbd5a0 a2=0 a3=7ffc17bbd58c items=0 ppid=1356 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:11.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:48:11.992000 audit[1399]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:11.992000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff132b45d0 a2=0 a3=7fff132b45bc items=0 ppid=1356 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:11.992000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 01:48:12.011000 audit[1404]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.011000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcdde50120 a2=0 a3=7ffcdde5010c items=0 ppid=1356 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.011000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 01:48:12.019000 audit[1406]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.019000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffccb2057c0 a2=0 a3=7ffccb2057ac items=0 ppid=1356 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.019000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 01:48:12.020000 audit[1408]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.020000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc424b5070 a2=0 a3=7ffc424b505c items=0 ppid=1356 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.020000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 01:48:12.022000 audit[1410]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.022000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcb09ca5d0 a2=0 a3=7ffcb09ca5bc items=0 ppid=1356 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.022000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:12.031000 audit[1414]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.031000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdb5d6a5e0 a2=0 a3=7ffdb5d6a5cc items=0 ppid=1356 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.031000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:12.036000 audit[1415]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.036000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff16900380 a2=0 a3=7fff1690036c items=0 ppid=1356 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.036000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:12.045557 kernel: Initializing XFRM netlink socket Dec 13 01:48:12.070919 env[1356]: time="2024-12-13T01:48:12.070886462Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 01:48:12.082000 audit[1423]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.082000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffb55d0340 a2=0 a3=7fffb55d032c items=0 ppid=1356 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.082000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 01:48:12.092000 audit[1426]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.092000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc3e965320 a2=0 a3=7ffc3e96530c items=0 ppid=1356 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.092000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 01:48:12.094000 audit[1429]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.094000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffff5faa6d0 a2=0 a3=7ffff5faa6bc items=0 ppid=1356 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.094000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 01:48:12.095000 audit[1431]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.095000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc9aef1be0 a2=0 a3=7ffc9aef1bcc items=0 ppid=1356 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.095000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 01:48:12.097000 audit[1433]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.097000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc8fd25ff0 a2=0 a3=7ffc8fd25fdc items=0 ppid=1356 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.097000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 01:48:12.098000 audit[1435]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.098000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffebfea8b80 a2=0 a3=7ffebfea8b6c items=0 ppid=1356 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 01:48:12.100000 audit[1437]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.100000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe7c328ec0 a2=0 a3=7ffe7c328eac items=0 ppid=1356 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.100000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 01:48:12.106000 audit[1440]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.106000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffab128fc0 a2=0 a3=7fffab128fac items=0 ppid=1356 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 01:48:12.107000 audit[1442]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.107000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffa9eea9e0 a2=0 a3=7fffa9eea9cc items=0 ppid=1356 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.107000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:48:12.109000 audit[1444]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.109000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcaaab02d0 a2=0 a3=7ffcaaab02bc items=0 ppid=1356 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:48:12.110000 audit[1446]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.110000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe766ba480 a2=0 a3=7ffe766ba46c items=0 ppid=1356 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.110000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 01:48:12.112559 systemd-networkd[1028]: docker0: Link UP Dec 13 01:48:12.119000 audit[1450]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.119000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2542eaf0 a2=0 a3=7fff2542eadc items=0 ppid=1356 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.119000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:12.124000 audit[1451]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:12.124000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd773ad3f0 a2=0 a3=7ffd773ad3dc items=0 ppid=1356 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:12.124000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:12.126694 env[1356]: time="2024-12-13T01:48:12.126662724Z" level=info msg="Loading containers: done." Dec 13 01:48:12.135220 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck329881672-merged.mount: Deactivated successfully. Dec 13 01:48:12.141434 env[1356]: time="2024-12-13T01:48:12.141393163Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 01:48:12.141622 env[1356]: time="2024-12-13T01:48:12.141596734Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 01:48:12.141716 env[1356]: time="2024-12-13T01:48:12.141692672Z" level=info msg="Daemon has completed initialization" Dec 13 01:48:12.157232 systemd[1]: Started docker.service. Dec 13 01:48:12.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:12.160713 env[1356]: time="2024-12-13T01:48:12.160675633Z" level=info msg="API listen on /run/docker.sock" Dec 13 01:48:12.421108 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 01:48:12.421352 systemd[1]: Stopped kubelet.service. Dec 13 01:48:12.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:12.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:12.423036 systemd[1]: Starting kubelet.service... Dec 13 01:48:12.495965 systemd[1]: Started kubelet.service. Dec 13 01:48:12.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:12.538949 kubelet[1490]: E1213 01:48:12.538880 1490 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:12.541907 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:12.542023 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:12.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:48:12.920474 env[1206]: time="2024-12-13T01:48:12.920354905Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 01:48:14.449334 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2485078630.mount: Deactivated successfully. Dec 13 01:48:16.137810 env[1206]: time="2024-12-13T01:48:16.137744768Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:16.139541 env[1206]: time="2024-12-13T01:48:16.139479421Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:16.144039 env[1206]: time="2024-12-13T01:48:16.144008817Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:16.146044 env[1206]: time="2024-12-13T01:48:16.146006948Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:16.146911 env[1206]: time="2024-12-13T01:48:16.146880235Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 01:48:16.156100 env[1206]: time="2024-12-13T01:48:16.156070423Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 01:48:18.350630 env[1206]: time="2024-12-13T01:48:18.350563040Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:18.352494 env[1206]: time="2024-12-13T01:48:18.352440991Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:18.354554 env[1206]: time="2024-12-13T01:48:18.354493936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:18.356092 env[1206]: time="2024-12-13T01:48:18.356049802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:18.356726 env[1206]: time="2024-12-13T01:48:18.356702675Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 01:48:18.365559 env[1206]: time="2024-12-13T01:48:18.365494064Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 01:48:19.959738 env[1206]: time="2024-12-13T01:48:19.959679103Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:19.961743 env[1206]: time="2024-12-13T01:48:19.961693626Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:19.964626 env[1206]: time="2024-12-13T01:48:19.964584246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:19.966492 env[1206]: time="2024-12-13T01:48:19.966467758Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:19.967240 env[1206]: time="2024-12-13T01:48:19.967206265Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 01:48:19.976402 env[1206]: time="2024-12-13T01:48:19.976362028Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 01:48:21.845506 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2935999782.mount: Deactivated successfully. Dec 13 01:48:22.403028 env[1206]: time="2024-12-13T01:48:22.402964653Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:22.404803 env[1206]: time="2024-12-13T01:48:22.404775631Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:22.406428 env[1206]: time="2024-12-13T01:48:22.406393618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:22.407805 env[1206]: time="2024-12-13T01:48:22.407761904Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:22.408067 env[1206]: time="2024-12-13T01:48:22.408040282Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 01:48:22.416916 env[1206]: time="2024-12-13T01:48:22.416875426Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 01:48:22.792730 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 01:48:22.792894 systemd[1]: Stopped kubelet.service. Dec 13 01:48:22.794235 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 01:48:22.794342 kernel: audit: type=1130 audit(1734054502.791:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:22.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:22.794073 systemd[1]: Starting kubelet.service... Dec 13 01:48:22.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:22.800114 kernel: audit: type=1131 audit(1734054502.791:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:22.868500 systemd[1]: Started kubelet.service. Dec 13 01:48:22.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:22.872535 kernel: audit: type=1130 audit(1734054502.867:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:22.935116 kubelet[1536]: E1213 01:48:22.935049 1536 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:22.937234 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:22.937351 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:22.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:48:22.941548 kernel: audit: type=1131 audit(1734054502.936:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:48:23.212719 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2770726590.mount: Deactivated successfully. Dec 13 01:48:25.026539 env[1206]: time="2024-12-13T01:48:25.026469016Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:25.150843 env[1206]: time="2024-12-13T01:48:25.150787276Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:25.292154 env[1206]: time="2024-12-13T01:48:25.292004360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:25.330481 env[1206]: time="2024-12-13T01:48:25.330400987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:25.331323 env[1206]: time="2024-12-13T01:48:25.331265438Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 01:48:25.340076 env[1206]: time="2024-12-13T01:48:25.340038197Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 01:48:26.508090 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2005500866.mount: Deactivated successfully. Dec 13 01:48:26.513480 env[1206]: time="2024-12-13T01:48:26.513439647Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:26.515331 env[1206]: time="2024-12-13T01:48:26.515308422Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:26.516914 env[1206]: time="2024-12-13T01:48:26.516881533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:26.518164 env[1206]: time="2024-12-13T01:48:26.518127163Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:26.518583 env[1206]: time="2024-12-13T01:48:26.518555223Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 01:48:26.526704 env[1206]: time="2024-12-13T01:48:26.526676590Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 01:48:27.063145 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1064786625.mount: Deactivated successfully. Dec 13 01:48:30.835699 env[1206]: time="2024-12-13T01:48:30.835638963Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:30.837882 env[1206]: time="2024-12-13T01:48:30.837850892Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:30.840271 env[1206]: time="2024-12-13T01:48:30.840222249Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:30.842114 env[1206]: time="2024-12-13T01:48:30.842090675Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:30.842830 env[1206]: time="2024-12-13T01:48:30.842767414Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 01:48:33.088759 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 01:48:33.088934 systemd[1]: Stopped kubelet.service. Dec 13 01:48:33.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.090154 systemd[1]: Starting kubelet.service... Dec 13 01:48:33.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.095449 kernel: audit: type=1130 audit(1734054513.088:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.095490 kernel: audit: type=1131 audit(1734054513.088:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.220326 systemd[1]: Started kubelet.service. Dec 13 01:48:33.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.224536 kernel: audit: type=1130 audit(1734054513.220:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.271135 kubelet[1638]: E1213 01:48:33.271078 1638 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:33.273152 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:33.273271 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:33.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:48:33.276539 kernel: audit: type=1131 audit(1734054513.271:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:48:33.341278 systemd[1]: Stopped kubelet.service. Dec 13 01:48:33.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.343272 systemd[1]: Starting kubelet.service... Dec 13 01:48:33.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.347699 kernel: audit: type=1130 audit(1734054513.339:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.347788 kernel: audit: type=1131 audit(1734054513.339:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.357393 systemd[1]: Reloading. Dec 13 01:48:33.423899 /usr/lib/systemd/system-generators/torcx-generator[1671]: time="2024-12-13T01:48:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:48:33.423929 /usr/lib/systemd/system-generators/torcx-generator[1671]: time="2024-12-13T01:48:33Z" level=info msg="torcx already run" Dec 13 01:48:34.028890 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:48:34.028911 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:48:34.052203 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:48:34.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138849 kernel: audit: type=1400 audit(1734054514.132:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138891 kernel: audit: type=1400 audit(1734054514.132:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138908 kernel: audit: type=1400 audit(1734054514.132:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141675 kernel: audit: type=1400 audit(1734054514.132:259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138000 audit: BPF prog-id=43 op=LOAD Dec 13 01:48:34.138000 audit: BPF prog-id=38 op=UNLOAD Dec 13 01:48:34.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141000 audit: BPF prog-id=44 op=LOAD Dec 13 01:48:34.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.144000 audit: BPF prog-id=45 op=LOAD Dec 13 01:48:34.144000 audit: BPF prog-id=39 op=UNLOAD Dec 13 01:48:34.144000 audit: BPF prog-id=40 op=UNLOAD Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.145000 audit: BPF prog-id=46 op=LOAD Dec 13 01:48:34.145000 audit: BPF prog-id=27 op=UNLOAD Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit: BPF prog-id=47 op=LOAD Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.147000 audit: BPF prog-id=48 op=LOAD Dec 13 01:48:34.147000 audit: BPF prog-id=28 op=UNLOAD Dec 13 01:48:34.147000 audit: BPF prog-id=29 op=UNLOAD Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit: BPF prog-id=49 op=LOAD Dec 13 01:48:34.148000 audit: BPF prog-id=30 op=UNLOAD Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit: BPF prog-id=50 op=LOAD Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.148000 audit: BPF prog-id=51 op=LOAD Dec 13 01:48:34.148000 audit: BPF prog-id=31 op=UNLOAD Dec 13 01:48:34.148000 audit: BPF prog-id=32 op=UNLOAD Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit: BPF prog-id=52 op=LOAD Dec 13 01:48:34.149000 audit: BPF prog-id=37 op=UNLOAD Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.149000 audit: BPF prog-id=53 op=LOAD Dec 13 01:48:34.149000 audit: BPF prog-id=41 op=UNLOAD Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit: BPF prog-id=54 op=LOAD Dec 13 01:48:34.150000 audit: BPF prog-id=33 op=UNLOAD Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit: BPF prog-id=55 op=LOAD Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.150000 audit: BPF prog-id=56 op=LOAD Dec 13 01:48:34.150000 audit: BPF prog-id=34 op=UNLOAD Dec 13 01:48:34.150000 audit: BPF prog-id=35 op=UNLOAD Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.151000 audit: BPF prog-id=57 op=LOAD Dec 13 01:48:34.151000 audit: BPF prog-id=36 op=UNLOAD Dec 13 01:48:34.161291 systemd[1]: Started kubelet.service. Dec 13 01:48:34.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:34.162449 systemd[1]: Stopping kubelet.service... Dec 13 01:48:34.162986 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:48:34.163120 systemd[1]: Stopped kubelet.service. Dec 13 01:48:34.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:34.164262 systemd[1]: Starting kubelet.service... Dec 13 01:48:34.236929 systemd[1]: Started kubelet.service. Dec 13 01:48:34.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:34.300646 kubelet[1720]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:48:34.300646 kubelet[1720]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:48:34.300646 kubelet[1720]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:48:34.300951 kubelet[1720]: I1213 01:48:34.300632 1720 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:48:34.795838 kubelet[1720]: I1213 01:48:34.795794 1720 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 01:48:34.795838 kubelet[1720]: I1213 01:48:34.795824 1720 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:48:34.796082 kubelet[1720]: I1213 01:48:34.796059 1720 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 01:48:34.811068 kubelet[1720]: E1213 01:48:34.811034 1720 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.22:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:34.811875 kubelet[1720]: I1213 01:48:34.811847 1720 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:48:34.821645 kubelet[1720]: I1213 01:48:34.821625 1720 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:48:34.822283 kubelet[1720]: I1213 01:48:34.822264 1720 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:48:34.822440 kubelet[1720]: I1213 01:48:34.822425 1720 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 01:48:34.822528 kubelet[1720]: I1213 01:48:34.822445 1720 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:48:34.822528 kubelet[1720]: I1213 01:48:34.822455 1720 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 01:48:34.822580 kubelet[1720]: I1213 01:48:34.822546 1720 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:48:34.822630 kubelet[1720]: I1213 01:48:34.822616 1720 kubelet.go:396] "Attempting to sync node with API server" Dec 13 01:48:34.822630 kubelet[1720]: I1213 01:48:34.822629 1720 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:48:34.822674 kubelet[1720]: I1213 01:48:34.822664 1720 kubelet.go:312] "Adding apiserver pod source" Dec 13 01:48:34.822695 kubelet[1720]: I1213 01:48:34.822676 1720 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:48:34.825499 kubelet[1720]: I1213 01:48:34.825473 1720 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:48:34.832149 kubelet[1720]: W1213 01:48:34.832112 1720 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.22:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:34.832203 kubelet[1720]: E1213 01:48:34.832172 1720 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.22:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:34.837149 kubelet[1720]: W1213 01:48:34.837118 1720 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.22:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:34.837192 kubelet[1720]: E1213 01:48:34.837154 1720 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.22:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:34.837907 kubelet[1720]: I1213 01:48:34.837884 1720 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:48:34.838720 kubelet[1720]: W1213 01:48:34.838697 1720 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 01:48:34.839168 kubelet[1720]: I1213 01:48:34.839147 1720 server.go:1256] "Started kubelet" Dec 13 01:48:34.840054 kubelet[1720]: I1213 01:48:34.840039 1720 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:48:34.840277 kubelet[1720]: I1213 01:48:34.840267 1720 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:48:34.840307 kubelet[1720]: I1213 01:48:34.840303 1720 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:48:34.839000 audit[1720]: AVC avc: denied { mac_admin } for pid=1720 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.839000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:34.839000 audit[1720]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00080d590 a1=c000848d20 a2=c00080d560 a3=25 items=0 ppid=1 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.839000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:34.839000 audit[1720]: AVC avc: denied { mac_admin } for pid=1720 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:34.839000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:34.839000 audit[1720]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000639f60 a1=c000848d38 a2=c00080d620 a3=25 items=0 ppid=1 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.839000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:34.840811 kubelet[1720]: I1213 01:48:34.840490 1720 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:48:34.840811 kubelet[1720]: I1213 01:48:34.840538 1720 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:48:34.840811 kubelet[1720]: I1213 01:48:34.840589 1720 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:48:34.840963 kubelet[1720]: I1213 01:48:34.840951 1720 server.go:461] "Adding debug handlers to kubelet server" Dec 13 01:48:34.842000 audit[1732]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:34.842000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd69c6e9c0 a2=0 a3=7ffd69c6e9ac items=0 ppid=1720 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:48:34.843000 audit[1733]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:34.843000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd38d46900 a2=0 a3=7ffd38d468ec items=0 ppid=1720 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:48:34.845068 kubelet[1720]: I1213 01:48:34.845047 1720 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 01:48:34.845748 kubelet[1720]: W1213 01:48:34.845680 1720 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.22:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:34.845748 kubelet[1720]: E1213 01:48:34.845724 1720 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.22:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:34.846286 kubelet[1720]: E1213 01:48:34.846070 1720 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.22:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.22:6443: connect: connection refused" interval="200ms" Dec 13 01:48:34.846286 kubelet[1720]: I1213 01:48:34.846110 1720 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 01:48:34.846286 kubelet[1720]: I1213 01:48:34.846144 1720 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 01:48:34.846455 kubelet[1720]: I1213 01:48:34.846438 1720 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:48:34.846577 kubelet[1720]: I1213 01:48:34.846560 1720 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:48:34.846955 kubelet[1720]: E1213 01:48:34.846895 1720 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:48:34.849547 kubelet[1720]: E1213 01:48:34.847176 1720 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.22:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.22:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18109964d225f78a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 01:48:34.83912385 +0000 UTC m=+0.577095944,LastTimestamp:2024-12-13 01:48:34.83912385 +0000 UTC m=+0.577095944,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 01:48:34.850000 audit[1735]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:34.850000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7bcda470 a2=0 a3=7ffd7bcda45c items=0 ppid=1720 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:48:34.851077 kubelet[1720]: I1213 01:48:34.851013 1720 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:48:34.851000 audit[1738]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:34.851000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff95398330 a2=0 a3=7fff9539831c items=0 ppid=1720 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:48:34.856000 audit[1741]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:34.856000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffebe3d4650 a2=0 a3=7ffebe3d463c items=0 ppid=1720 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 01:48:34.857666 kubelet[1720]: I1213 01:48:34.857630 1720 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:48:34.857000 audit[1742]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:34.857000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdbe924bd0 a2=0 a3=7ffdbe924bbc items=0 ppid=1720 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:48:34.858391 kubelet[1720]: I1213 01:48:34.858335 1720 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:48:34.858391 kubelet[1720]: I1213 01:48:34.858367 1720 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:48:34.858391 kubelet[1720]: I1213 01:48:34.858389 1720 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 01:48:34.858473 kubelet[1720]: E1213 01:48:34.858432 1720 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:48:34.858000 audit[1744]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:34.858000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc31b8a440 a2=0 a3=7ffc31b8a42c items=0 ppid=1720 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:48:34.859000 audit[1746]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:34.859000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda6d7afd0 a2=0 a3=7ffda6d7afbc items=0 ppid=1720 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:48:34.860000 audit[1748]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:34.860000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb2385d90 a2=0 a3=7ffcb2385d7c items=0 ppid=1720 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:48:34.861000 audit[1749]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:34.861000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5f8e9ec0 a2=0 a3=7ffd5f8e9eac items=0 ppid=1720 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:48:34.861000 audit[1750]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:34.861000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdc59ad9f0 a2=0 a3=7ffdc59ad9dc items=0 ppid=1720 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:48:34.862811 kubelet[1720]: W1213 01:48:34.862753 1720 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.22:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:34.862865 kubelet[1720]: E1213 01:48:34.862814 1720 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.22:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:34.863081 kubelet[1720]: I1213 01:48:34.863066 1720 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:48:34.863081 kubelet[1720]: I1213 01:48:34.863081 1720 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:48:34.863081 kubelet[1720]: I1213 01:48:34.863094 1720 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:48:34.862000 audit[1751]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:34.862000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde79ceb70 a2=0 a3=7ffde79ceb5c items=0 ppid=1720 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:34.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:48:34.946823 kubelet[1720]: I1213 01:48:34.946785 1720 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:48:34.947134 kubelet[1720]: E1213 01:48:34.947110 1720 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.22:6443/api/v1/nodes\": dial tcp 10.0.0.22:6443: connect: connection refused" node="localhost" Dec 13 01:48:34.959241 kubelet[1720]: E1213 01:48:34.959207 1720 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 01:48:35.046826 kubelet[1720]: E1213 01:48:35.046727 1720 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.22:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.22:6443: connect: connection refused" interval="400ms" Dec 13 01:48:35.148392 kubelet[1720]: I1213 01:48:35.148368 1720 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:48:35.148710 kubelet[1720]: E1213 01:48:35.148687 1720 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.22:6443/api/v1/nodes\": dial tcp 10.0.0.22:6443: connect: connection refused" node="localhost" Dec 13 01:48:35.159781 kubelet[1720]: E1213 01:48:35.159730 1720 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 01:48:35.447838 kubelet[1720]: E1213 01:48:35.447797 1720 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.22:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.22:6443: connect: connection refused" interval="800ms" Dec 13 01:48:35.550494 kubelet[1720]: I1213 01:48:35.550453 1720 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:48:35.550872 kubelet[1720]: E1213 01:48:35.550841 1720 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.22:6443/api/v1/nodes\": dial tcp 10.0.0.22:6443: connect: connection refused" node="localhost" Dec 13 01:48:35.559849 kubelet[1720]: E1213 01:48:35.559818 1720 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 01:48:35.748755 kubelet[1720]: I1213 01:48:35.748654 1720 policy_none.go:49] "None policy: Start" Dec 13 01:48:35.749467 kubelet[1720]: I1213 01:48:35.749435 1720 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:48:35.749467 kubelet[1720]: I1213 01:48:35.749477 1720 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:48:35.757719 systemd[1]: Created slice kubepods.slice. Dec 13 01:48:35.761417 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 01:48:35.765168 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 01:48:35.776084 kubelet[1720]: I1213 01:48:35.776041 1720 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:48:35.774000 audit[1720]: AVC avc: denied { mac_admin } for pid=1720 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:35.774000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:35.774000 audit[1720]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e2ac30 a1=c0009dcbd0 a2=c000e2ac00 a3=25 items=0 ppid=1 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:35.774000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:35.776433 kubelet[1720]: I1213 01:48:35.776150 1720 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:48:35.776433 kubelet[1720]: I1213 01:48:35.776367 1720 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:48:35.777550 kubelet[1720]: E1213 01:48:35.777514 1720 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 01:48:36.054962 kubelet[1720]: W1213 01:48:36.054833 1720 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.22:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:36.054962 kubelet[1720]: E1213 01:48:36.054896 1720 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.22:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:36.161842 kubelet[1720]: W1213 01:48:36.161802 1720 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.22:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:36.161842 kubelet[1720]: E1213 01:48:36.161842 1720 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.22:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:36.236163 kubelet[1720]: W1213 01:48:36.236127 1720 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.22:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:36.236219 kubelet[1720]: E1213 01:48:36.236161 1720 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.22:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:36.248609 kubelet[1720]: E1213 01:48:36.248586 1720 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.22:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.22:6443: connect: connection refused" interval="1.6s" Dec 13 01:48:36.324506 kubelet[1720]: W1213 01:48:36.324432 1720 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.22:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:36.324506 kubelet[1720]: E1213 01:48:36.324460 1720 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.22:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:36.352664 kubelet[1720]: I1213 01:48:36.352635 1720 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:48:36.352841 kubelet[1720]: E1213 01:48:36.352827 1720 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.22:6443/api/v1/nodes\": dial tcp 10.0.0.22:6443: connect: connection refused" node="localhost" Dec 13 01:48:36.360140 kubelet[1720]: I1213 01:48:36.360113 1720 topology_manager.go:215] "Topology Admit Handler" podUID="30d3fed43cf1bb3415764ed2c9b2a5a3" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 01:48:36.360811 kubelet[1720]: I1213 01:48:36.360780 1720 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 01:48:36.361534 kubelet[1720]: I1213 01:48:36.361502 1720 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 01:48:36.365893 systemd[1]: Created slice kubepods-burstable-pod4f8e0d694c07e04969646aa3c152c34a.slice. Dec 13 01:48:36.373015 systemd[1]: Created slice kubepods-burstable-podc4144e8f85b2123a6afada0c1705bbba.slice. Dec 13 01:48:36.379945 systemd[1]: Created slice kubepods-burstable-pod30d3fed43cf1bb3415764ed2c9b2a5a3.slice. Dec 13 01:48:36.455079 kubelet[1720]: I1213 01:48:36.455050 1720 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:36.455353 kubelet[1720]: I1213 01:48:36.455091 1720 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:36.455353 kubelet[1720]: I1213 01:48:36.455119 1720 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 01:48:36.455353 kubelet[1720]: I1213 01:48:36.455142 1720 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/30d3fed43cf1bb3415764ed2c9b2a5a3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"30d3fed43cf1bb3415764ed2c9b2a5a3\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:48:36.455353 kubelet[1720]: I1213 01:48:36.455165 1720 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/30d3fed43cf1bb3415764ed2c9b2a5a3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"30d3fed43cf1bb3415764ed2c9b2a5a3\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:48:36.455353 kubelet[1720]: I1213 01:48:36.455253 1720 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:36.455460 kubelet[1720]: I1213 01:48:36.455306 1720 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/30d3fed43cf1bb3415764ed2c9b2a5a3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"30d3fed43cf1bb3415764ed2c9b2a5a3\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:48:36.455460 kubelet[1720]: I1213 01:48:36.455345 1720 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:36.455460 kubelet[1720]: I1213 01:48:36.455379 1720 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:36.671366 kubelet[1720]: E1213 01:48:36.671334 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:36.672085 env[1206]: time="2024-12-13T01:48:36.672040974Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,}" Dec 13 01:48:36.679229 kubelet[1720]: E1213 01:48:36.679188 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:36.679611 env[1206]: time="2024-12-13T01:48:36.679578604Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,}" Dec 13 01:48:36.682859 kubelet[1720]: E1213 01:48:36.682830 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:36.683241 env[1206]: time="2024-12-13T01:48:36.683199326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:30d3fed43cf1bb3415764ed2c9b2a5a3,Namespace:kube-system,Attempt:0,}" Dec 13 01:48:37.008148 kubelet[1720]: E1213 01:48:37.008041 1720 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.22:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.22:6443: connect: connection refused Dec 13 01:48:37.236979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount819132093.mount: Deactivated successfully. Dec 13 01:48:37.242920 env[1206]: time="2024-12-13T01:48:37.242884520Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.244415 env[1206]: time="2024-12-13T01:48:37.244387718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.246034 env[1206]: time="2024-12-13T01:48:37.245990288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.246935 env[1206]: time="2024-12-13T01:48:37.246900858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.248488 env[1206]: time="2024-12-13T01:48:37.248445215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.249549 env[1206]: time="2024-12-13T01:48:37.249526586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.251205 env[1206]: time="2024-12-13T01:48:37.251169795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.252417 env[1206]: time="2024-12-13T01:48:37.252393945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.255553 env[1206]: time="2024-12-13T01:48:37.255530174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.256591 env[1206]: time="2024-12-13T01:48:37.256570797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.257096 env[1206]: time="2024-12-13T01:48:37.257068444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.258344 env[1206]: time="2024-12-13T01:48:37.258244898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:37.282941 env[1206]: time="2024-12-13T01:48:37.277580624Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:37.282941 env[1206]: time="2024-12-13T01:48:37.277615717Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:37.282941 env[1206]: time="2024-12-13T01:48:37.277628300Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:37.282941 env[1206]: time="2024-12-13T01:48:37.277718980Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01a78b635101c4ca3257643a3ba1368d6bd8df80ff6702620f86281eb360d17c pid=1761 runtime=io.containerd.runc.v2 Dec 13 01:48:37.290754 env[1206]: time="2024-12-13T01:48:37.289106154Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:37.290754 env[1206]: time="2024-12-13T01:48:37.289137517Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:37.290754 env[1206]: time="2024-12-13T01:48:37.289161269Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:37.290754 env[1206]: time="2024-12-13T01:48:37.289354802Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/468043b6a35e5304dcedcdae3cedc90901666475aba74b040c8689fabab6eeec pid=1786 runtime=io.containerd.runc.v2 Dec 13 01:48:37.290500 systemd[1]: Started cri-containerd-01a78b635101c4ca3257643a3ba1368d6bd8df80ff6702620f86281eb360d17c.scope. Dec 13 01:48:37.295922 env[1206]: time="2024-12-13T01:48:37.295713247Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:37.295922 env[1206]: time="2024-12-13T01:48:37.295748430Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:37.295922 env[1206]: time="2024-12-13T01:48:37.295760493Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:37.296142 env[1206]: time="2024-12-13T01:48:37.296025023Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e58a18ec5d89aa6e9960f9e0b79aad157ba4a28a43a8818979d70925e29dac8 pid=1802 runtime=io.containerd.runc.v2 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit: BPF prog-id=58 op=LOAD Dec 13 01:48:37.300000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.300000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1761 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031613738623633353130316334636133323537363433613362613133 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1761 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031613738623633353130316334636133323537363433613362613133 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit: BPF prog-id=59 op=LOAD Dec 13 01:48:37.301000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304cb0 items=0 ppid=1761 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031613738623633353130316334636133323537363433613362613133 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit: BPF prog-id=60 op=LOAD Dec 13 01:48:37.301000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304cf8 items=0 ppid=1761 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031613738623633353130316334636133323537363433613362613133 Dec 13 01:48:37.301000 audit: BPF prog-id=60 op=UNLOAD Dec 13 01:48:37.301000 audit: BPF prog-id=59 op=UNLOAD Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.301000 audit: BPF prog-id=61 op=LOAD Dec 13 01:48:37.301000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000305108 items=0 ppid=1761 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031613738623633353130316334636133323537363433613362613133 Dec 13 01:48:37.306796 systemd[1]: Started cri-containerd-468043b6a35e5304dcedcdae3cedc90901666475aba74b040c8689fabab6eeec.scope. Dec 13 01:48:37.316094 systemd[1]: Started cri-containerd-0e58a18ec5d89aa6e9960f9e0b79aad157ba4a28a43a8818979d70925e29dac8.scope. Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.323000 audit: BPF prog-id=62 op=LOAD Dec 13 01:48:37.325000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.325000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1786 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383034336236613335653533303464636564636461653363656463 Dec 13 01:48:37.325000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.325000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1786 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383034336236613335653533303464636564636461653363656463 Dec 13 01:48:37.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit: BPF prog-id=63 op=LOAD Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit: BPF prog-id=64 op=LOAD Dec 13 01:48:37.327000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002fdb50 items=0 ppid=1786 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383034336236613335653533303464636564636461653363656463 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit: BPF prog-id=65 op=LOAD Dec 13 01:48:37.327000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002fdb98 items=0 ppid=1786 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383034336236613335653533303464636564636461653363656463 Dec 13 01:48:37.327000 audit: BPF prog-id=65 op=UNLOAD Dec 13 01:48:37.327000 audit: BPF prog-id=64 op=UNLOAD Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.327000 audit: BPF prog-id=66 op=LOAD Dec 13 01:48:37.327000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002fdfa8 items=0 ppid=1786 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383034336236613335653533303464636564636461653363656463 Dec 13 01:48:37.329873 env[1206]: time="2024-12-13T01:48:37.328361844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:30d3fed43cf1bb3415764ed2c9b2a5a3,Namespace:kube-system,Attempt:0,} returns sandbox id \"01a78b635101c4ca3257643a3ba1368d6bd8df80ff6702620f86281eb360d17c\"" Dec 13 01:48:37.329929 kubelet[1720]: E1213 01:48:37.329386 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:37.329000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.329000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1802 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353861313865633564383961613665393936306639653062373961 Dec 13 01:48:37.329000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.329000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1802 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353861313865633564383961613665393936306639653062373961 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit: BPF prog-id=67 op=LOAD Dec 13 01:48:37.330000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000219380 items=0 ppid=1802 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353861313865633564383961613665393936306639653062373961 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.330000 audit: BPF prog-id=68 op=LOAD Dec 13 01:48:37.330000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002193c8 items=0 ppid=1802 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353861313865633564383961613665393936306639653062373961 Dec 13 01:48:37.331000 audit: BPF prog-id=68 op=UNLOAD Dec 13 01:48:37.331000 audit: BPF prog-id=67 op=UNLOAD Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.332780 env[1206]: time="2024-12-13T01:48:37.332492304Z" level=info msg="CreateContainer within sandbox \"01a78b635101c4ca3257643a3ba1368d6bd8df80ff6702620f86281eb360d17c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 01:48:37.331000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.331000 audit: BPF prog-id=69 op=LOAD Dec 13 01:48:37.331000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002197d8 items=0 ppid=1802 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353861313865633564383961613665393936306639653062373961 Dec 13 01:48:37.354092 env[1206]: time="2024-12-13T01:48:37.354055525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,} returns sandbox id \"468043b6a35e5304dcedcdae3cedc90901666475aba74b040c8689fabab6eeec\"" Dec 13 01:48:37.354673 kubelet[1720]: E1213 01:48:37.354643 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:37.354761 env[1206]: time="2024-12-13T01:48:37.354734232Z" level=info msg="CreateContainer within sandbox \"01a78b635101c4ca3257643a3ba1368d6bd8df80ff6702620f86281eb360d17c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"fa422621e7171bf930386c5b9477571f7ace45dbe1677a48c7abd702bb353f3b\"" Dec 13 01:48:37.355343 env[1206]: time="2024-12-13T01:48:37.355323892Z" level=info msg="StartContainer for \"fa422621e7171bf930386c5b9477571f7ace45dbe1677a48c7abd702bb353f3b\"" Dec 13 01:48:37.356402 env[1206]: time="2024-12-13T01:48:37.356383345Z" level=info msg="CreateContainer within sandbox \"468043b6a35e5304dcedcdae3cedc90901666475aba74b040c8689fabab6eeec\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 01:48:37.361677 env[1206]: time="2024-12-13T01:48:37.361624745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,} returns sandbox id \"0e58a18ec5d89aa6e9960f9e0b79aad157ba4a28a43a8818979d70925e29dac8\"" Dec 13 01:48:37.362211 kubelet[1720]: E1213 01:48:37.362190 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:37.364094 env[1206]: time="2024-12-13T01:48:37.364064692Z" level=info msg="CreateContainer within sandbox \"0e58a18ec5d89aa6e9960f9e0b79aad157ba4a28a43a8818979d70925e29dac8\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 01:48:37.369813 systemd[1]: Started cri-containerd-fa422621e7171bf930386c5b9477571f7ace45dbe1677a48c7abd702bb353f3b.scope. Dec 13 01:48:37.373248 env[1206]: time="2024-12-13T01:48:37.373221573Z" level=info msg="CreateContainer within sandbox \"468043b6a35e5304dcedcdae3cedc90901666475aba74b040c8689fabab6eeec\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"985b82d86b66ec02db842eab36baf6c78018eeacb2b9c054df142401adb966e1\"" Dec 13 01:48:37.373684 env[1206]: time="2024-12-13T01:48:37.373665668Z" level=info msg="StartContainer for \"985b82d86b66ec02db842eab36baf6c78018eeacb2b9c054df142401adb966e1\"" Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.379000 audit: BPF prog-id=70 op=LOAD Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1761 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343232363231653731373162663933303338366335623934373735 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1761 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343232363231653731373162663933303338366335623934373735 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit: BPF prog-id=71 op=LOAD Dec 13 01:48:37.380000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000294e70 items=0 ppid=1761 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343232363231653731373162663933303338366335623934373735 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit: BPF prog-id=72 op=LOAD Dec 13 01:48:37.380000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000294eb8 items=0 ppid=1761 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343232363231653731373162663933303338366335623934373735 Dec 13 01:48:37.380000 audit: BPF prog-id=72 op=UNLOAD Dec 13 01:48:37.380000 audit: BPF prog-id=71 op=UNLOAD Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.380000 audit: BPF prog-id=73 op=LOAD Dec 13 01:48:37.380000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002952c8 items=0 ppid=1761 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661343232363231653731373162663933303338366335623934373735 Dec 13 01:48:37.384208 env[1206]: time="2024-12-13T01:48:37.384164471Z" level=info msg="CreateContainer within sandbox \"0e58a18ec5d89aa6e9960f9e0b79aad157ba4a28a43a8818979d70925e29dac8\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"158f9c4d833cfe897fc44af3a9711c1c5d2f29b21388e387814c726b785e956a\"" Dec 13 01:48:37.384684 env[1206]: time="2024-12-13T01:48:37.384666560Z" level=info msg="StartContainer for \"158f9c4d833cfe897fc44af3a9711c1c5d2f29b21388e387814c726b785e956a\"" Dec 13 01:48:37.390446 systemd[1]: Started cri-containerd-985b82d86b66ec02db842eab36baf6c78018eeacb2b9c054df142401adb966e1.scope. Dec 13 01:48:37.398343 systemd[1]: Started cri-containerd-158f9c4d833cfe897fc44af3a9711c1c5d2f29b21388e387814c726b785e956a.scope. Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.403000 audit: BPF prog-id=74 op=LOAD Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1786 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938356238326438366236366563303264623834326561623336626166 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1786 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938356238326438366236366563303264623834326561623336626166 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit: BPF prog-id=75 op=LOAD Dec 13 01:48:37.404000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000259d10 items=0 ppid=1786 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938356238326438366236366563303264623834326561623336626166 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.404000 audit: BPF prog-id=76 op=LOAD Dec 13 01:48:37.404000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000259d58 items=0 ppid=1786 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938356238326438366236366563303264623834326561623336626166 Dec 13 01:48:37.405000 audit: BPF prog-id=76 op=UNLOAD Dec 13 01:48:37.405000 audit: BPF prog-id=75 op=UNLOAD Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.405000 audit: BPF prog-id=77 op=LOAD Dec 13 01:48:37.405000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000456168 items=0 ppid=1786 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938356238326438366236366563303264623834326561623336626166 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit: BPF prog-id=78 op=LOAD Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1802 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386639633464383333636665383937666334346166336139373131 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1802 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386639633464383333636665383937666334346166336139373131 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit: BPF prog-id=79 op=LOAD Dec 13 01:48:37.412000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000efe40 items=0 ppid=1802 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386639633464383333636665383937666334346166336139373131 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.412000 audit: BPF prog-id=80 op=LOAD Dec 13 01:48:37.412000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000efe88 items=0 ppid=1802 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386639633464383333636665383937666334346166336139373131 Dec 13 01:48:37.413000 audit: BPF prog-id=80 op=UNLOAD Dec 13 01:48:37.413000 audit: BPF prog-id=79 op=UNLOAD Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:37.413000 audit: BPF prog-id=81 op=LOAD Dec 13 01:48:37.413000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003cc298 items=0 ppid=1802 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:37.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386639633464383333636665383937666334346166336139373131 Dec 13 01:48:37.416966 env[1206]: time="2024-12-13T01:48:37.416935942Z" level=info msg="StartContainer for \"fa422621e7171bf930386c5b9477571f7ace45dbe1677a48c7abd702bb353f3b\" returns successfully" Dec 13 01:48:37.436570 env[1206]: time="2024-12-13T01:48:37.436492684Z" level=info msg="StartContainer for \"985b82d86b66ec02db842eab36baf6c78018eeacb2b9c054df142401adb966e1\" returns successfully" Dec 13 01:48:37.442716 env[1206]: time="2024-12-13T01:48:37.442667123Z" level=info msg="StartContainer for \"158f9c4d833cfe897fc44af3a9711c1c5d2f29b21388e387814c726b785e956a\" returns successfully" Dec 13 01:48:37.868875 kubelet[1720]: E1213 01:48:37.868849 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:37.870415 kubelet[1720]: E1213 01:48:37.870398 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:37.871903 kubelet[1720]: E1213 01:48:37.871887 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:37.954414 kubelet[1720]: I1213 01:48:37.954386 1720 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:48:38.053000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.053000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00052d230 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:38.053000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:38.053000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.053000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000586f60 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:38.053000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:38.457000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.463265 kernel: kauditd_printk_skb: 567 callbacks suppressed Dec 13 01:48:38.463343 kernel: audit: type=1400 audit(1734054518.457:556): avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.463378 kernel: audit: type=1300 audit(1734054518.457:556): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c004acfa40 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:48:38.457000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c004acfa40 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:48:38.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:48:38.473537 kernel: audit: type=1327 audit(1734054518.457:556): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:48:38.457000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.482126 kernel: audit: type=1400 audit(1734054518.457:557): avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.482166 kernel: audit: type=1300 audit(1734054518.457:557): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006f66000 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:48:38.457000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006f66000 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:48:38.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:48:38.486591 kubelet[1720]: E1213 01:48:38.485017 1720 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 01:48:38.486677 kernel: audit: type=1327 audit(1734054518.457:557): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:48:38.458000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.494554 kernel: audit: type=1400 audit(1734054518.458:558): avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.458000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004badbf0 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:48:38.506276 kernel: audit: type=1300 audit(1734054518.458:558): arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004badbf0 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:48:38.506349 kernel: audit: type=1327 audit(1734054518.458:558): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:48:38.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:48:38.466000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.466000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006c19700 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:48:38.466000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:48:38.481000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.481000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003c9def0 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:48:38.481000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:48:38.484000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.484000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0032b3aa0 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:48:38.511546 kernel: audit: type=1400 audit(1734054518.466:559): avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:38.484000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:48:38.584103 kubelet[1720]: I1213 01:48:38.584051 1720 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 01:48:38.825759 kubelet[1720]: I1213 01:48:38.825650 1720 apiserver.go:52] "Watching apiserver" Dec 13 01:48:38.846748 kubelet[1720]: I1213 01:48:38.846721 1720 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 01:48:38.876580 kubelet[1720]: E1213 01:48:38.876564 1720 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Dec 13 01:48:38.876957 kubelet[1720]: E1213 01:48:38.876929 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:39.878860 kubelet[1720]: E1213 01:48:39.878830 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:40.876307 kubelet[1720]: E1213 01:48:40.876279 1720 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:41.323716 systemd[1]: Reloading. Dec 13 01:48:41.387104 /usr/lib/systemd/system-generators/torcx-generator[2018]: time="2024-12-13T01:48:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:48:41.387130 /usr/lib/systemd/system-generators/torcx-generator[2018]: time="2024-12-13T01:48:41Z" level=info msg="torcx already run" Dec 13 01:48:41.445419 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:48:41.445435 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:48:41.462500 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit: BPF prog-id=82 op=LOAD Dec 13 01:48:41.532000 audit: BPF prog-id=43 op=UNLOAD Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit: BPF prog-id=83 op=LOAD Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit: BPF prog-id=84 op=LOAD Dec 13 01:48:41.533000 audit: BPF prog-id=44 op=UNLOAD Dec 13 01:48:41.533000 audit: BPF prog-id=45 op=UNLOAD Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.533000 audit: BPF prog-id=85 op=LOAD Dec 13 01:48:41.533000 audit: BPF prog-id=58 op=UNLOAD Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.534000 audit: BPF prog-id=86 op=LOAD Dec 13 01:48:41.534000 audit: BPF prog-id=46 op=UNLOAD Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit: BPF prog-id=87 op=LOAD Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.536000 audit: BPF prog-id=88 op=LOAD Dec 13 01:48:41.536000 audit: BPF prog-id=47 op=UNLOAD Dec 13 01:48:41.536000 audit: BPF prog-id=48 op=UNLOAD Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit: BPF prog-id=89 op=LOAD Dec 13 01:48:41.537000 audit: BPF prog-id=74 op=UNLOAD Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.537000 audit: BPF prog-id=90 op=LOAD Dec 13 01:48:41.537000 audit: BPF prog-id=63 op=UNLOAD Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit: BPF prog-id=91 op=LOAD Dec 13 01:48:41.538000 audit: BPF prog-id=49 op=UNLOAD Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit: BPF prog-id=92 op=LOAD Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.538000 audit: BPF prog-id=93 op=LOAD Dec 13 01:48:41.538000 audit: BPF prog-id=50 op=UNLOAD Dec 13 01:48:41.538000 audit: BPF prog-id=51 op=UNLOAD Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit: BPF prog-id=94 op=LOAD Dec 13 01:48:41.539000 audit: BPF prog-id=52 op=UNLOAD Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit: BPF prog-id=95 op=LOAD Dec 13 01:48:41.539000 audit: BPF prog-id=62 op=UNLOAD Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit: BPF prog-id=96 op=LOAD Dec 13 01:48:41.540000 audit: BPF prog-id=70 op=UNLOAD Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.540000 audit: BPF prog-id=97 op=LOAD Dec 13 01:48:41.540000 audit: BPF prog-id=53 op=UNLOAD Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit: BPF prog-id=98 op=LOAD Dec 13 01:48:41.541000 audit: BPF prog-id=54 op=UNLOAD Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit: BPF prog-id=99 op=LOAD Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit: BPF prog-id=100 op=LOAD Dec 13 01:48:41.541000 audit: BPF prog-id=55 op=UNLOAD Dec 13 01:48:41.541000 audit: BPF prog-id=56 op=UNLOAD Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.541000 audit: BPF prog-id=101 op=LOAD Dec 13 01:48:41.541000 audit: BPF prog-id=78 op=UNLOAD Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.543000 audit: BPF prog-id=102 op=LOAD Dec 13 01:48:41.543000 audit: BPF prog-id=57 op=UNLOAD Dec 13 01:48:41.552731 kubelet[1720]: I1213 01:48:41.552613 1720 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:48:41.552720 systemd[1]: Stopping kubelet.service... Dec 13 01:48:41.575707 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:48:41.575851 systemd[1]: Stopped kubelet.service. Dec 13 01:48:41.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:41.577537 systemd[1]: Starting kubelet.service... Dec 13 01:48:41.649101 systemd[1]: Started kubelet.service. Dec 13 01:48:41.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:41.691776 kubelet[2063]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:48:41.691776 kubelet[2063]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:48:41.691776 kubelet[2063]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:48:41.692124 kubelet[2063]: I1213 01:48:41.691807 2063 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:48:41.696821 kubelet[2063]: I1213 01:48:41.696800 2063 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 01:48:41.696893 kubelet[2063]: I1213 01:48:41.696879 2063 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:48:41.697134 kubelet[2063]: I1213 01:48:41.697121 2063 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 01:48:41.698471 kubelet[2063]: I1213 01:48:41.698438 2063 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 01:48:41.700103 kubelet[2063]: I1213 01:48:41.700046 2063 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:48:41.708392 kubelet[2063]: I1213 01:48:41.708353 2063 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:48:41.708568 kubelet[2063]: I1213 01:48:41.708552 2063 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:48:41.708736 kubelet[2063]: I1213 01:48:41.708712 2063 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 01:48:41.708736 kubelet[2063]: I1213 01:48:41.708736 2063 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:48:41.708839 kubelet[2063]: I1213 01:48:41.708745 2063 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 01:48:41.708839 kubelet[2063]: I1213 01:48:41.708772 2063 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:48:41.708894 kubelet[2063]: I1213 01:48:41.708847 2063 kubelet.go:396] "Attempting to sync node with API server" Dec 13 01:48:41.708894 kubelet[2063]: I1213 01:48:41.708860 2063 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:48:41.708894 kubelet[2063]: I1213 01:48:41.708879 2063 kubelet.go:312] "Adding apiserver pod source" Dec 13 01:48:41.708894 kubelet[2063]: I1213 01:48:41.708889 2063 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:48:41.709492 kubelet[2063]: I1213 01:48:41.709471 2063 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:48:41.709827 kubelet[2063]: I1213 01:48:41.709816 2063 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:48:41.710369 kubelet[2063]: I1213 01:48:41.710357 2063 server.go:1256] "Started kubelet" Dec 13 01:48:41.710713 kubelet[2063]: I1213 01:48:41.710700 2063 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:48:41.711496 kubelet[2063]: I1213 01:48:41.711478 2063 server.go:461] "Adding debug handlers to kubelet server" Dec 13 01:48:41.712493 kubelet[2063]: I1213 01:48:41.712479 2063 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:48:41.712701 kubelet[2063]: I1213 01:48:41.712689 2063 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:48:41.714000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.714000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:41.714000 audit[2063]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00077ccf0 a1=c000560e88 a2=c00077ccc0 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.714000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:41.714000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.714000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:41.714000 audit[2063]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000163240 a1=c000560ea0 a2=c00077cd80 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.714000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:41.715189 kubelet[2063]: I1213 01:48:41.714892 2063 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:48:41.715189 kubelet[2063]: I1213 01:48:41.714926 2063 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:48:41.715189 kubelet[2063]: I1213 01:48:41.714945 2063 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:48:41.718120 kubelet[2063]: I1213 01:48:41.718049 2063 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 01:48:41.718120 kubelet[2063]: I1213 01:48:41.718116 2063 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 01:48:41.718240 kubelet[2063]: I1213 01:48:41.718221 2063 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 01:48:41.723080 kubelet[2063]: I1213 01:48:41.723063 2063 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:48:41.723240 kubelet[2063]: I1213 01:48:41.723220 2063 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:48:41.727868 kubelet[2063]: I1213 01:48:41.727855 2063 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:48:41.738409 kubelet[2063]: I1213 01:48:41.738348 2063 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:48:41.740417 kubelet[2063]: I1213 01:48:41.740397 2063 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:48:41.740463 kubelet[2063]: I1213 01:48:41.740422 2063 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:48:41.740463 kubelet[2063]: I1213 01:48:41.740439 2063 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 01:48:41.740544 kubelet[2063]: E1213 01:48:41.740495 2063 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:48:41.753309 kubelet[2063]: I1213 01:48:41.753271 2063 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:48:41.753309 kubelet[2063]: I1213 01:48:41.753302 2063 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:48:41.753394 kubelet[2063]: I1213 01:48:41.753316 2063 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:48:41.753500 kubelet[2063]: I1213 01:48:41.753484 2063 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 01:48:41.753556 kubelet[2063]: I1213 01:48:41.753509 2063 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 01:48:41.753556 kubelet[2063]: I1213 01:48:41.753534 2063 policy_none.go:49] "None policy: Start" Dec 13 01:48:41.754024 kubelet[2063]: I1213 01:48:41.754005 2063 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:48:41.754024 kubelet[2063]: I1213 01:48:41.754025 2063 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:48:41.754213 kubelet[2063]: I1213 01:48:41.754198 2063 state_mem.go:75] "Updated machine memory state" Dec 13 01:48:41.757365 kubelet[2063]: I1213 01:48:41.757349 2063 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:48:41.757000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.757000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:41.757000 audit[2063]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e7ce70 a1=c000d150e0 a2=c000e7ce40 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.757000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:41.757863 kubelet[2063]: I1213 01:48:41.757848 2063 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:48:41.758084 kubelet[2063]: I1213 01:48:41.758072 2063 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:48:41.820989 kubelet[2063]: I1213 01:48:41.820963 2063 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:48:41.826100 kubelet[2063]: I1213 01:48:41.826042 2063 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 01:48:41.826100 kubelet[2063]: I1213 01:48:41.826099 2063 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 01:48:41.841080 kubelet[2063]: I1213 01:48:41.841051 2063 topology_manager.go:215] "Topology Admit Handler" podUID="30d3fed43cf1bb3415764ed2c9b2a5a3" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 01:48:41.841181 kubelet[2063]: I1213 01:48:41.841120 2063 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 01:48:41.841181 kubelet[2063]: I1213 01:48:41.841151 2063 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 01:48:41.846792 kubelet[2063]: E1213 01:48:41.846765 2063 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 01:48:42.019700 kubelet[2063]: I1213 01:48:42.019660 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:42.019700 kubelet[2063]: I1213 01:48:42.019703 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 01:48:42.019700 kubelet[2063]: I1213 01:48:42.019722 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/30d3fed43cf1bb3415764ed2c9b2a5a3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"30d3fed43cf1bb3415764ed2c9b2a5a3\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:48:42.019923 kubelet[2063]: I1213 01:48:42.019741 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/30d3fed43cf1bb3415764ed2c9b2a5a3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"30d3fed43cf1bb3415764ed2c9b2a5a3\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:48:42.019923 kubelet[2063]: I1213 01:48:42.019769 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:42.019923 kubelet[2063]: I1213 01:48:42.019807 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:42.019923 kubelet[2063]: I1213 01:48:42.019825 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:42.019923 kubelet[2063]: I1213 01:48:42.019843 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/30d3fed43cf1bb3415764ed2c9b2a5a3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"30d3fed43cf1bb3415764ed2c9b2a5a3\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:48:42.020035 kubelet[2063]: I1213 01:48:42.019859 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:42.147618 kubelet[2063]: E1213 01:48:42.147579 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:42.147801 kubelet[2063]: E1213 01:48:42.147780 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:42.147858 kubelet[2063]: E1213 01:48:42.147807 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:42.709450 kubelet[2063]: I1213 01:48:42.709382 2063 apiserver.go:52] "Watching apiserver" Dec 13 01:48:42.718447 kubelet[2063]: I1213 01:48:42.718414 2063 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 01:48:42.749325 kubelet[2063]: E1213 01:48:42.749288 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:42.758980 kubelet[2063]: E1213 01:48:42.758955 2063 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Dec 13 01:48:42.759496 kubelet[2063]: E1213 01:48:42.759482 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:42.759815 kubelet[2063]: E1213 01:48:42.759803 2063 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 01:48:42.760247 kubelet[2063]: E1213 01:48:42.760205 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:42.782725 kubelet[2063]: I1213 01:48:42.782680 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.782629118 podStartE2EDuration="1.782629118s" podCreationTimestamp="2024-12-13 01:48:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:48:42.773311185 +0000 UTC m=+1.119465045" watchObservedRunningTime="2024-12-13 01:48:42.782629118 +0000 UTC m=+1.128782988" Dec 13 01:48:42.959838 kubelet[2063]: I1213 01:48:42.959712 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.95963874 podStartE2EDuration="1.95963874s" podCreationTimestamp="2024-12-13 01:48:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:48:42.783578778 +0000 UTC m=+1.129732668" watchObservedRunningTime="2024-12-13 01:48:42.95963874 +0000 UTC m=+1.305792610" Dec 13 01:48:42.976586 kubelet[2063]: I1213 01:48:42.976558 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.976500708 podStartE2EDuration="3.976500708s" podCreationTimestamp="2024-12-13 01:48:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:48:42.96048332 +0000 UTC m=+1.306637190" watchObservedRunningTime="2024-12-13 01:48:42.976500708 +0000 UTC m=+1.322654578" Dec 13 01:48:43.750945 kubelet[2063]: E1213 01:48:43.750916 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:43.751456 kubelet[2063]: E1213 01:48:43.751329 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:43.908694 kubelet[2063]: E1213 01:48:43.908658 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:44.752092 kubelet[2063]: E1213 01:48:44.752058 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:45.108153 update_engine[1200]: I1213 01:48:45.108122 1200 update_attempter.cc:509] Updating boot flags... Dec 13 01:48:46.028175 sudo[1343]: pam_unix(sudo:session): session closed for user root Dec 13 01:48:46.027000 audit[1343]: USER_END pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:46.029224 kernel: kauditd_printk_skb: 266 callbacks suppressed Dec 13 01:48:46.029274 kernel: audit: type=1106 audit(1734054526.027:811): pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:46.029454 sshd[1340]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:46.027000 audit[1343]: CRED_DISP pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:46.032280 systemd[1]: sshd@6-10.0.0.22:22-10.0.0.1:49756.service: Deactivated successfully. Dec 13 01:48:46.032933 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 01:48:46.033051 systemd[1]: session-7.scope: Consumed 4.058s CPU time. Dec 13 01:48:46.033599 systemd-logind[1192]: Session 7 logged out. Waiting for processes to exit. Dec 13 01:48:46.034198 systemd-logind[1192]: Removed session 7. Dec 13 01:48:46.035980 kernel: audit: type=1104 audit(1734054526.027:812): pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:46.036010 kernel: audit: type=1106 audit(1734054526.030:813): pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:46.030000 audit[1340]: USER_END pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:46.040109 kernel: audit: type=1104 audit(1734054526.030:814): pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:46.030000 audit[1340]: CRED_DISP pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:48:46.043426 kernel: audit: type=1131 audit(1734054526.031:815): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.22:22-10.0.0.1:49756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:46.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.22:22-10.0.0.1:49756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.119128 kubelet[2063]: E1213 01:48:52.119084 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:52.536487 kubelet[2063]: E1213 01:48:52.536369 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:52.761173 kubelet[2063]: E1213 01:48:52.761141 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:53.762600 kubelet[2063]: E1213 01:48:53.762564 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:53.913418 kubelet[2063]: E1213 01:48:53.913385 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:55.007000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:55.007000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011bb7a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:55.020300 kernel: audit: type=1400 audit(1734054535.007:816): avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:55.020347 kernel: audit: type=1300 audit(1734054535.007:816): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011bb7a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:55.020367 kernel: audit: type=1327 audit(1734054535.007:816): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:55.007000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:55.008000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:55.030269 kernel: audit: type=1400 audit(1734054535.008:817): avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:55.030310 kernel: audit: type=1300 audit(1734054535.008:817): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008d20e0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:55.008000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008d20e0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:55.036789 kernel: audit: type=1327 audit(1734054535.008:817): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:55.008000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:55.008000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:55.046782 kernel: audit: type=1400 audit(1734054535.008:818): avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:55.046828 kernel: audit: type=1300 audit(1734054535.008:818): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008d21a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:55.008000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008d21a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:55.052975 kernel: audit: type=1327 audit(1734054535.008:818): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:55.008000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:55.008000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:55.062153 kernel: audit: type=1400 audit(1734054535.008:819): avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:55.008000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bed3a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:55.008000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:56.858000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 01:48:56.858000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d8e1c0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:48:56.858000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:57.000820 kubelet[2063]: I1213 01:48:57.000781 2063 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 01:48:57.001126 env[1206]: time="2024-12-13T01:48:57.001074344Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 01:48:57.001533 kubelet[2063]: I1213 01:48:57.001490 2063 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 01:48:57.871205 kubelet[2063]: I1213 01:48:57.871162 2063 topology_manager.go:215] "Topology Admit Handler" podUID="212776a3-c3cc-4a78-b174-ca670b86ea2f" podNamespace="kube-system" podName="kube-proxy-2n8xr" Dec 13 01:48:57.876352 systemd[1]: Created slice kubepods-besteffort-pod212776a3_c3cc_4a78_b174_ca670b86ea2f.slice. Dec 13 01:48:57.929372 kubelet[2063]: I1213 01:48:57.929332 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/212776a3-c3cc-4a78-b174-ca670b86ea2f-kube-proxy\") pod \"kube-proxy-2n8xr\" (UID: \"212776a3-c3cc-4a78-b174-ca670b86ea2f\") " pod="kube-system/kube-proxy-2n8xr" Dec 13 01:48:57.929563 kubelet[2063]: I1213 01:48:57.929384 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/212776a3-c3cc-4a78-b174-ca670b86ea2f-xtables-lock\") pod \"kube-proxy-2n8xr\" (UID: \"212776a3-c3cc-4a78-b174-ca670b86ea2f\") " pod="kube-system/kube-proxy-2n8xr" Dec 13 01:48:57.929563 kubelet[2063]: I1213 01:48:57.929498 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9bgv9\" (UniqueName: \"kubernetes.io/projected/212776a3-c3cc-4a78-b174-ca670b86ea2f-kube-api-access-9bgv9\") pod \"kube-proxy-2n8xr\" (UID: \"212776a3-c3cc-4a78-b174-ca670b86ea2f\") " pod="kube-system/kube-proxy-2n8xr" Dec 13 01:48:57.929612 kubelet[2063]: I1213 01:48:57.929568 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/212776a3-c3cc-4a78-b174-ca670b86ea2f-lib-modules\") pod \"kube-proxy-2n8xr\" (UID: \"212776a3-c3cc-4a78-b174-ca670b86ea2f\") " pod="kube-system/kube-proxy-2n8xr" Dec 13 01:48:58.162195 kubelet[2063]: I1213 01:48:58.162075 2063 topology_manager.go:215] "Topology Admit Handler" podUID="3bc319d4-a56c-45cc-9e9c-fe1cbf5d1ce2" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-njp84" Dec 13 01:48:58.165011 kubelet[2063]: W1213 01:48:58.164979 2063 reflector.go:539] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object Dec 13 01:48:58.165117 kubelet[2063]: E1213 01:48:58.165020 2063 reflector.go:147] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object Dec 13 01:48:58.168681 systemd[1]: Created slice kubepods-besteffort-pod3bc319d4_a56c_45cc_9e9c_fe1cbf5d1ce2.slice. Dec 13 01:48:58.186207 kubelet[2063]: E1213 01:48:58.186162 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:58.187103 env[1206]: time="2024-12-13T01:48:58.187049079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2n8xr,Uid:212776a3-c3cc-4a78-b174-ca670b86ea2f,Namespace:kube-system,Attempt:0,}" Dec 13 01:48:58.204809 env[1206]: time="2024-12-13T01:48:58.204743886Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:58.204809 env[1206]: time="2024-12-13T01:48:58.204820511Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:58.205001 env[1206]: time="2024-12-13T01:48:58.204844834Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:58.205117 env[1206]: time="2024-12-13T01:48:58.205056590Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33da9c942e2124f3f24a4732d460bd4e538657ef531711ca10df624c2f7be832 pid=2173 runtime=io.containerd.runc.v2 Dec 13 01:48:58.219573 systemd[1]: Started cri-containerd-33da9c942e2124f3f24a4732d460bd4e538657ef531711ca10df624c2f7be832.scope. Dec 13 01:48:58.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit: BPF prog-id=103 op=LOAD Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646139633934326532313234663366323461343733326434363062 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646139633934326532313234663366323461343733326434363062 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit: BPF prog-id=104 op=LOAD Dec 13 01:48:58.229000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00024f5a0 items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646139633934326532313234663366323461343733326434363062 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit: BPF prog-id=105 op=LOAD Dec 13 01:48:58.229000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00024f5e8 items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646139633934326532313234663366323461343733326434363062 Dec 13 01:48:58.229000 audit: BPF prog-id=105 op=UNLOAD Dec 13 01:48:58.229000 audit: BPF prog-id=104 op=UNLOAD Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.229000 audit: BPF prog-id=106 op=LOAD Dec 13 01:48:58.229000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00024f9f8 items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333646139633934326532313234663366323461343733326434363062 Dec 13 01:48:58.231789 kubelet[2063]: I1213 01:48:58.231739 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3bc319d4-a56c-45cc-9e9c-fe1cbf5d1ce2-var-lib-calico\") pod \"tigera-operator-c7ccbd65-njp84\" (UID: \"3bc319d4-a56c-45cc-9e9c-fe1cbf5d1ce2\") " pod="tigera-operator/tigera-operator-c7ccbd65-njp84" Dec 13 01:48:58.231789 kubelet[2063]: I1213 01:48:58.231791 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8f9dz\" (UniqueName: \"kubernetes.io/projected/3bc319d4-a56c-45cc-9e9c-fe1cbf5d1ce2-kube-api-access-8f9dz\") pod \"tigera-operator-c7ccbd65-njp84\" (UID: \"3bc319d4-a56c-45cc-9e9c-fe1cbf5d1ce2\") " pod="tigera-operator/tigera-operator-c7ccbd65-njp84" Dec 13 01:48:58.239410 env[1206]: time="2024-12-13T01:48:58.239375248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2n8xr,Uid:212776a3-c3cc-4a78-b174-ca670b86ea2f,Namespace:kube-system,Attempt:0,} returns sandbox id \"33da9c942e2124f3f24a4732d460bd4e538657ef531711ca10df624c2f7be832\"" Dec 13 01:48:58.240168 kubelet[2063]: E1213 01:48:58.240144 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:58.243661 env[1206]: time="2024-12-13T01:48:58.243611505Z" level=info msg="CreateContainer within sandbox \"33da9c942e2124f3f24a4732d460bd4e538657ef531711ca10df624c2f7be832\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 01:48:58.258919 env[1206]: time="2024-12-13T01:48:58.258881289Z" level=info msg="CreateContainer within sandbox \"33da9c942e2124f3f24a4732d460bd4e538657ef531711ca10df624c2f7be832\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"562b6b9fc23a61bd1385adee7d8bfb30010a259ddf27cd4d6f06c2c8a0ac236d\"" Dec 13 01:48:58.259988 env[1206]: time="2024-12-13T01:48:58.259538644Z" level=info msg="StartContainer for \"562b6b9fc23a61bd1385adee7d8bfb30010a259ddf27cd4d6f06c2c8a0ac236d\"" Dec 13 01:48:58.277355 systemd[1]: Started cri-containerd-562b6b9fc23a61bd1385adee7d8bfb30010a259ddf27cd4d6f06c2c8a0ac236d.scope. Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f52bf5f62c8 items=0 ppid=2173 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536326236623966633233613631626431333835616465653764386266 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit: BPF prog-id=107 op=LOAD Dec 13 01:48:58.292000 audit[2213]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=2173 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536326236623966633233613631626431333835616465653764386266 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit: BPF prog-id=108 op=LOAD Dec 13 01:48:58.292000 audit[2213]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=2173 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536326236623966633233613631626431333835616465653764386266 Dec 13 01:48:58.292000 audit: BPF prog-id=108 op=UNLOAD Dec 13 01:48:58.292000 audit: BPF prog-id=107 op=UNLOAD Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.292000 audit: BPF prog-id=109 op=LOAD Dec 13 01:48:58.292000 audit[2213]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=2173 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536326236623966633233613631626431333835616465653764386266 Dec 13 01:48:58.304925 env[1206]: time="2024-12-13T01:48:58.304876991Z" level=info msg="StartContainer for \"562b6b9fc23a61bd1385adee7d8bfb30010a259ddf27cd4d6f06c2c8a0ac236d\" returns successfully" Dec 13 01:48:58.358000 audit[2268]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.358000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8725abb0 a2=0 a3=7ffc8725ab9c items=0 ppid=2224 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:48:58.360000 audit[2270]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.360000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0e884ce0 a2=0 a3=7ffc0e884ccc items=0 ppid=2224 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:48:58.360000 audit[2269]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.360000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef4709ca0 a2=0 a3=7ffef4709c8c items=0 ppid=2224 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:48:58.361000 audit[2271]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.361000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1fd6ed40 a2=0 a3=7ffe1fd6ed2c items=0 ppid=2224 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:48:58.361000 audit[2272]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.361000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda3e044c0 a2=0 a3=7ffda3e044ac items=0 ppid=2224 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:48:58.363000 audit[2273]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.363000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5d97db00 a2=0 a3=7ffc5d97daec items=0 ppid=2224 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:48:58.460000 audit[2274]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.460000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcfd47d2c0 a2=0 a3=7ffcfd47d2ac items=0 ppid=2224 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:48:58.463000 audit[2276]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.463000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc10c78110 a2=0 a3=7ffc10c780fc items=0 ppid=2224 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 01:48:58.466000 audit[2279]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.466000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc624a82d0 a2=0 a3=7ffc624a82bc items=0 ppid=2224 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 01:48:58.467000 audit[2280]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.467000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe08350da0 a2=0 a3=7ffe08350d8c items=0 ppid=2224 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:48:58.469000 audit[2282]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.469000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd49db48c0 a2=0 a3=7ffd49db48ac items=0 ppid=2224 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:48:58.470000 audit[2283]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.470000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd8a1ee80 a2=0 a3=7ffdd8a1ee6c items=0 ppid=2224 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:48:58.472409 env[1206]: time="2024-12-13T01:48:58.472368800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-njp84,Uid:3bc319d4-a56c-45cc-9e9c-fe1cbf5d1ce2,Namespace:tigera-operator,Attempt:0,}" Dec 13 01:48:58.472000 audit[2285]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.472000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcde065260 a2=0 a3=7ffcde06524c items=0 ppid=2224 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:48:58.475000 audit[2288]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.475000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc53a7d10 a2=0 a3=7ffdc53a7cfc items=0 ppid=2224 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 01:48:58.476000 audit[2289]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.476000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcda40a440 a2=0 a3=7ffcda40a42c items=0 ppid=2224 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:48:58.478000 audit[2291]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.478000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2be03030 a2=0 a3=7ffd2be0301c items=0 ppid=2224 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:48:58.480000 audit[2292]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.480000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3b337210 a2=0 a3=7ffe3b3371fc items=0 ppid=2224 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:48:58.482000 audit[2294]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.482000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe17291900 a2=0 a3=7ffe172918ec items=0 ppid=2224 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:48:58.485000 audit[2297]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.485000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2bd2f290 a2=0 a3=7fff2bd2f27c items=0 ppid=2224 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:48:58.488000 audit[2300]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.488000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6d65bd30 a2=0 a3=7ffc6d65bd1c items=0 ppid=2224 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:48:58.489000 audit[2302]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.489000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff31f6570 a2=0 a3=7ffff31f655c items=0 ppid=2224 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:48:58.492000 audit[2310]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.492000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd39754690 a2=0 a3=7ffd3975467c items=0 ppid=2224 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:48:58.495097 env[1206]: time="2024-12-13T01:48:58.494318595Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:58.495097 env[1206]: time="2024-12-13T01:48:58.494391753Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:58.495097 env[1206]: time="2024-12-13T01:48:58.494417468Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:58.495097 env[1206]: time="2024-12-13T01:48:58.494671736Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89bfa249ecb5cb3cadbc211804e14138be212cc3fa176fa4cd1d64c4e6bb3763 pid=2311 runtime=io.containerd.runc.v2 Dec 13 01:48:58.496000 audit[2323]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.496000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdfcd9b260 a2=0 a3=7ffdfcd9b24c items=0 ppid=2224 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:48:58.497000 audit[2329]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.497000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccca3a6a0 a2=0 a3=7ffccca3a68c items=0 ppid=2224 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:48:58.500000 audit[2331]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:58.500000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd8ff863c0 a2=0 a3=7ffd8ff863ac items=0 ppid=2224 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.500000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:48:58.505715 systemd[1]: Started cri-containerd-89bfa249ecb5cb3cadbc211804e14138be212cc3fa176fa4cd1d64c4e6bb3763.scope. Dec 13 01:48:58.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit: BPF prog-id=110 op=LOAD Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839626661323439656362356362336361646263323131383034653134 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839626661323439656362356362336361646263323131383034653134 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.517000 audit: BPF prog-id=111 op=LOAD Dec 13 01:48:58.517000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002e89d0 items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839626661323439656362356362336361646263323131383034653134 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit: BPF prog-id=112 op=LOAD Dec 13 01:48:58.518000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002e8a18 items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839626661323439656362356362336361646263323131383034653134 Dec 13 01:48:58.518000 audit: BPF prog-id=112 op=UNLOAD Dec 13 01:48:58.518000 audit: BPF prog-id=111 op=UNLOAD Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:58.518000 audit: BPF prog-id=113 op=LOAD Dec 13 01:48:58.518000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002e8e28 items=0 ppid=2311 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839626661323439656362356362336361646263323131383034653134 Dec 13 01:48:58.521000 audit[2343]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:58.521000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffebf7eea60 a2=0 a3=7ffebf7eea4c items=0 ppid=2224 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:58.530000 audit[2343]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:58.530000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffebf7eea60 a2=0 a3=7ffebf7eea4c items=0 ppid=2224 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:58.532000 audit[2354]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.532000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd1924a480 a2=0 a3=7ffd1924a46c items=0 ppid=2224 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:48:58.536000 audit[2356]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.536000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff44b49560 a2=0 a3=7fff44b4954c items=0 ppid=2224 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 01:48:58.540000 audit[2361]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.540000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffecc93c220 a2=0 a3=7ffecc93c20c items=0 ppid=2224 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 01:48:58.541000 audit[2367]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.541000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed05db9f0 a2=0 a3=7ffed05db9dc items=0 ppid=2224 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:48:58.543000 audit[2369]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.543000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc9786af0 a2=0 a3=7ffdc9786adc items=0 ppid=2224 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:48:58.544000 audit[2370]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.544000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdde350080 a2=0 a3=7ffdde35006c items=0 ppid=2224 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:48:58.546000 audit[2372]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.546000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc2113e590 a2=0 a3=7ffc2113e57c items=0 ppid=2224 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 01:48:58.547680 env[1206]: time="2024-12-13T01:48:58.547633956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-njp84,Uid:3bc319d4-a56c-45cc-9e9c-fe1cbf5d1ce2,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"89bfa249ecb5cb3cadbc211804e14138be212cc3fa176fa4cd1d64c4e6bb3763\"" Dec 13 01:48:58.550595 env[1206]: time="2024-12-13T01:48:58.549496278Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 01:48:58.550000 audit[2375]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.550000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff189c8ac0 a2=0 a3=7fff189c8aac items=0 ppid=2224 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:48:58.551000 audit[2376]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.551000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd371f1810 a2=0 a3=7ffd371f17fc items=0 ppid=2224 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:48:58.553000 audit[2378]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.553000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc5866c00 a2=0 a3=7fffc5866bec items=0 ppid=2224 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:48:58.554000 audit[2379]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.554000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe04543590 a2=0 a3=7ffe0454357c items=0 ppid=2224 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:48:58.556000 audit[2381]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.556000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd62a01340 a2=0 a3=7ffd62a0132c items=0 ppid=2224 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:48:58.559000 audit[2384]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.559000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc0f88f40 a2=0 a3=7ffcc0f88f2c items=0 ppid=2224 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:48:58.563000 audit[2387]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.563000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff30858000 a2=0 a3=7fff30857fec items=0 ppid=2224 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.563000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 01:48:58.564000 audit[2388]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.564000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffbd71e710 a2=0 a3=7fffbd71e6fc items=0 ppid=2224 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:48:58.566000 audit[2390]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.566000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe3bc5d050 a2=0 a3=7ffe3bc5d03c items=0 ppid=2224 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:48:58.569000 audit[2393]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.569000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdb9373e90 a2=0 a3=7ffdb9373e7c items=0 ppid=2224 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:48:58.570000 audit[2394]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.570000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff91b4a6e0 a2=0 a3=7fff91b4a6cc items=0 ppid=2224 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:48:58.571000 audit[2396]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.571000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffa80548d0 a2=0 a3=7fffa80548bc items=0 ppid=2224 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:48:58.572000 audit[2397]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.572000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5c322e70 a2=0 a3=7ffd5c322e5c items=0 ppid=2224 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:48:58.574000 audit[2399]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.574000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffabe1c0c0 a2=0 a3=7fffabe1c0ac items=0 ppid=2224 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:48:58.577000 audit[2402]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:58.577000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1f6276f0 a2=0 a3=7fff1f6276dc items=0 ppid=2224 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:48:58.580000 audit[2404]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:48:58.580000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffdc3989110 a2=0 a3=7ffdc39890fc items=0 ppid=2224 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:58.580000 audit[2404]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:48:58.580000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdc3989110 a2=0 a3=7ffdc39890fc items=0 ppid=2224 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:58.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:58.771239 kubelet[2063]: E1213 01:48:58.771094 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:48:58.780626 kubelet[2063]: I1213 01:48:58.780581 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2n8xr" podStartSLOduration=1.7805114290000001 podStartE2EDuration="1.780511429s" podCreationTimestamp="2024-12-13 01:48:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:48:58.780220622 +0000 UTC m=+17.126374502" watchObservedRunningTime="2024-12-13 01:48:58.780511429 +0000 UTC m=+17.126665329" Dec 13 01:48:59.126858 systemd[1]: run-containerd-runc-k8s.io-33da9c942e2124f3f24a4732d460bd4e538657ef531711ca10df624c2f7be832-runc.rMQtzC.mount: Deactivated successfully. Dec 13 01:49:00.120912 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2391473922.mount: Deactivated successfully. Dec 13 01:49:01.083655 env[1206]: time="2024-12-13T01:49:01.083588229Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.085761 env[1206]: time="2024-12-13T01:49:01.085712652Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.087257 env[1206]: time="2024-12-13T01:49:01.087234093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.088697 env[1206]: time="2024-12-13T01:49:01.088642505Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.089140 env[1206]: time="2024-12-13T01:49:01.089111832Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 01:49:01.090900 env[1206]: time="2024-12-13T01:49:01.090855395Z" level=info msg="CreateContainer within sandbox \"89bfa249ecb5cb3cadbc211804e14138be212cc3fa176fa4cd1d64c4e6bb3763\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 01:49:01.103014 env[1206]: time="2024-12-13T01:49:01.102968113Z" level=info msg="CreateContainer within sandbox \"89bfa249ecb5cb3cadbc211804e14138be212cc3fa176fa4cd1d64c4e6bb3763\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7f2c71f7ac01f004a71328eb1bb171b34ae712686487b3535ec7909711c23295\"" Dec 13 01:49:01.103444 env[1206]: time="2024-12-13T01:49:01.103394760Z" level=info msg="StartContainer for \"7f2c71f7ac01f004a71328eb1bb171b34ae712686487b3535ec7909711c23295\"" Dec 13 01:49:01.122457 systemd[1]: Started cri-containerd-7f2c71f7ac01f004a71328eb1bb171b34ae712686487b3535ec7909711c23295.scope. Dec 13 01:49:01.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.138241 kernel: kauditd_printk_skb: 315 callbacks suppressed Dec 13 01:49:01.138338 kernel: audit: type=1400 audit(1734054541.135:914): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.145039 kernel: audit: type=1400 audit(1734054541.135:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.148702 kernel: audit: type=1400 audit(1734054541.135:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.152308 kernel: audit: type=1400 audit(1734054541.135:917): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.152388 kernel: audit: type=1400 audit(1734054541.135:918): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.158758 kernel: audit: type=1400 audit(1734054541.135:919): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.158809 kernel: audit: type=1400 audit(1734054541.135:920): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.165022 kernel: audit: type=1400 audit(1734054541.135:921): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.165069 kernel: audit: type=1400 audit(1734054541.135:922): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.170777 kernel: audit: type=1400 audit(1734054541.140:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit: BPF prog-id=114 op=LOAD Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2311 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326337316637616330316630303461373133323865623162623137 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2311 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326337316637616330316630303461373133323865623162623137 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.140000 audit: BPF prog-id=115 op=LOAD Dec 13 01:49:01.140000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003087f0 items=0 ppid=2311 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326337316637616330316630303461373133323865623162623137 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit: BPF prog-id=116 op=LOAD Dec 13 01:49:01.144000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308838 items=0 ppid=2311 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326337316637616330316630303461373133323865623162623137 Dec 13 01:49:01.144000 audit: BPF prog-id=116 op=UNLOAD Dec 13 01:49:01.144000 audit: BPF prog-id=115 op=UNLOAD Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.144000 audit: BPF prog-id=117 op=LOAD Dec 13 01:49:01.144000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308c48 items=0 ppid=2311 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326337316637616330316630303461373133323865623162623137 Dec 13 01:49:01.218692 env[1206]: time="2024-12-13T01:49:01.218607551Z" level=info msg="StartContainer for \"7f2c71f7ac01f004a71328eb1bb171b34ae712686487b3535ec7909711c23295\" returns successfully" Dec 13 01:49:02.098715 systemd[1]: run-containerd-runc-k8s.io-7f2c71f7ac01f004a71328eb1bb171b34ae712686487b3535ec7909711c23295-runc.J11v33.mount: Deactivated successfully. Dec 13 01:49:03.803000 audit[2449]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:03.803000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee5a9f250 a2=0 a3=7ffee5a9f23c items=0 ppid=2224 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:03.803000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:03.807000 audit[2449]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:03.807000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee5a9f250 a2=0 a3=0 items=0 ppid=2224 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:03.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:03.816000 audit[2451]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:03.816000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff40f35140 a2=0 a3=7fff40f3512c items=0 ppid=2224 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:03.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:03.821000 audit[2451]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:03.821000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff40f35140 a2=0 a3=0 items=0 ppid=2224 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:03.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:03.945378 kubelet[2063]: I1213 01:49:03.945343 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-njp84" podStartSLOduration=3.4046409300000002 podStartE2EDuration="5.945305122s" podCreationTimestamp="2024-12-13 01:48:58 +0000 UTC" firstStartedPulling="2024-12-13 01:48:58.548775636 +0000 UTC m=+16.894929506" lastFinishedPulling="2024-12-13 01:49:01.089439828 +0000 UTC m=+19.435593698" observedRunningTime="2024-12-13 01:49:01.785193473 +0000 UTC m=+20.131347353" watchObservedRunningTime="2024-12-13 01:49:03.945305122 +0000 UTC m=+22.291458992" Dec 13 01:49:03.945866 kubelet[2063]: I1213 01:49:03.945464 2063 topology_manager.go:215] "Topology Admit Handler" podUID="c16e6336-5a44-4dcb-8446-0103e9ffae13" podNamespace="calico-system" podName="calico-typha-8495f899bf-wdrhp" Dec 13 01:49:03.959761 systemd[1]: Created slice kubepods-besteffort-podc16e6336_5a44_4dcb_8446_0103e9ffae13.slice. Dec 13 01:49:03.969472 kubelet[2063]: I1213 01:49:03.969419 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c16e6336-5a44-4dcb-8446-0103e9ffae13-tigera-ca-bundle\") pod \"calico-typha-8495f899bf-wdrhp\" (UID: \"c16e6336-5a44-4dcb-8446-0103e9ffae13\") " pod="calico-system/calico-typha-8495f899bf-wdrhp" Dec 13 01:49:03.969603 kubelet[2063]: I1213 01:49:03.969492 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c16e6336-5a44-4dcb-8446-0103e9ffae13-typha-certs\") pod \"calico-typha-8495f899bf-wdrhp\" (UID: \"c16e6336-5a44-4dcb-8446-0103e9ffae13\") " pod="calico-system/calico-typha-8495f899bf-wdrhp" Dec 13 01:49:03.969603 kubelet[2063]: I1213 01:49:03.969586 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vbf6w\" (UniqueName: \"kubernetes.io/projected/c16e6336-5a44-4dcb-8446-0103e9ffae13-kube-api-access-vbf6w\") pod \"calico-typha-8495f899bf-wdrhp\" (UID: \"c16e6336-5a44-4dcb-8446-0103e9ffae13\") " pod="calico-system/calico-typha-8495f899bf-wdrhp" Dec 13 01:49:04.007692 kubelet[2063]: I1213 01:49:04.007648 2063 topology_manager.go:215] "Topology Admit Handler" podUID="6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a" podNamespace="calico-system" podName="calico-node-wbhns" Dec 13 01:49:04.013253 systemd[1]: Created slice kubepods-besteffort-pod6830a0b1_ccd3_4b58_ab45_9f0c4abc0c3a.slice. Dec 13 01:49:04.070608 kubelet[2063]: I1213 01:49:04.070468 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-flexvol-driver-host\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070608 kubelet[2063]: I1213 01:49:04.070507 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-cni-net-dir\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070608 kubelet[2063]: I1213 01:49:04.070595 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-lib-modules\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070841 kubelet[2063]: I1213 01:49:04.070721 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-xtables-lock\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070841 kubelet[2063]: I1213 01:49:04.070757 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-policysync\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070841 kubelet[2063]: I1213 01:49:04.070783 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-node-certs\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070841 kubelet[2063]: I1213 01:49:04.070822 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-cni-log-dir\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070999 kubelet[2063]: I1213 01:49:04.070905 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-cni-bin-dir\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070999 kubelet[2063]: I1213 01:49:04.070955 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-var-run-calico\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070999 kubelet[2063]: I1213 01:49:04.070976 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-var-lib-calico\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.070999 kubelet[2063]: I1213 01:49:04.070999 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d7r2q\" (UniqueName: \"kubernetes.io/projected/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-kube-api-access-d7r2q\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.071161 kubelet[2063]: I1213 01:49:04.071023 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a-tigera-ca-bundle\") pod \"calico-node-wbhns\" (UID: \"6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a\") " pod="calico-system/calico-node-wbhns" Dec 13 01:49:04.176757 kubelet[2063]: E1213 01:49:04.176718 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.176757 kubelet[2063]: W1213 01:49:04.176744 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.176949 kubelet[2063]: E1213 01:49:04.176782 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.179611 kubelet[2063]: I1213 01:49:04.179589 2063 topology_manager.go:215] "Topology Admit Handler" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" podNamespace="calico-system" podName="csi-node-driver-7cxjh" Dec 13 01:49:04.179978 kubelet[2063]: E1213 01:49:04.179961 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:04.188124 kubelet[2063]: E1213 01:49:04.188098 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.188298 kubelet[2063]: W1213 01:49:04.188277 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.188404 kubelet[2063]: E1213 01:49:04.188385 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.263094 kubelet[2063]: E1213 01:49:04.263047 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.263094 kubelet[2063]: W1213 01:49:04.263078 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.263094 kubelet[2063]: E1213 01:49:04.263098 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.263333 kubelet[2063]: E1213 01:49:04.263247 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.263333 kubelet[2063]: W1213 01:49:04.263252 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.263333 kubelet[2063]: E1213 01:49:04.263261 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.263432 kubelet[2063]: E1213 01:49:04.263409 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.263432 kubelet[2063]: W1213 01:49:04.263414 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.263432 kubelet[2063]: E1213 01:49:04.263423 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.263588 kubelet[2063]: E1213 01:49:04.263567 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.263588 kubelet[2063]: W1213 01:49:04.263579 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.263588 kubelet[2063]: E1213 01:49:04.263588 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.263763 kubelet[2063]: E1213 01:49:04.263739 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.263763 kubelet[2063]: W1213 01:49:04.263754 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.263763 kubelet[2063]: E1213 01:49:04.263764 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.263922 kubelet[2063]: E1213 01:49:04.263903 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.263922 kubelet[2063]: W1213 01:49:04.263914 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.263922 kubelet[2063]: E1213 01:49:04.263922 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.264081 kubelet[2063]: E1213 01:49:04.264055 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.264081 kubelet[2063]: W1213 01:49:04.264073 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.264081 kubelet[2063]: E1213 01:49:04.264081 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.264237 kubelet[2063]: E1213 01:49:04.264217 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.264237 kubelet[2063]: W1213 01:49:04.264228 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.264237 kubelet[2063]: E1213 01:49:04.264235 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.264404 kubelet[2063]: E1213 01:49:04.264383 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.264404 kubelet[2063]: W1213 01:49:04.264394 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.264404 kubelet[2063]: E1213 01:49:04.264403 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.264571 kubelet[2063]: E1213 01:49:04.264551 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.264571 kubelet[2063]: W1213 01:49:04.264562 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.264571 kubelet[2063]: E1213 01:49:04.264571 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.264727 kubelet[2063]: E1213 01:49:04.264707 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.264727 kubelet[2063]: W1213 01:49:04.264718 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.264727 kubelet[2063]: E1213 01:49:04.264726 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.264881 kubelet[2063]: E1213 01:49:04.264861 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.264881 kubelet[2063]: W1213 01:49:04.264883 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.264956 kubelet[2063]: E1213 01:49:04.264892 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.265104 kubelet[2063]: E1213 01:49:04.265083 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.265104 kubelet[2063]: W1213 01:49:04.265095 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.265104 kubelet[2063]: E1213 01:49:04.265103 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.265266 kubelet[2063]: E1213 01:49:04.265245 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.265266 kubelet[2063]: W1213 01:49:04.265256 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.265266 kubelet[2063]: E1213 01:49:04.265264 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.265428 kubelet[2063]: E1213 01:49:04.265406 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.265428 kubelet[2063]: W1213 01:49:04.265418 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.265428 kubelet[2063]: E1213 01:49:04.265426 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.265574 kubelet[2063]: E1213 01:49:04.265534 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.265574 kubelet[2063]: W1213 01:49:04.265540 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.265574 kubelet[2063]: E1213 01:49:04.265549 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.266435 kubelet[2063]: E1213 01:49:04.266409 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:04.266727 kubelet[2063]: E1213 01:49:04.266704 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.266727 kubelet[2063]: W1213 01:49:04.266716 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.266727 kubelet[2063]: E1213 01:49:04.266727 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.267051 kubelet[2063]: E1213 01:49:04.267029 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.267051 kubelet[2063]: W1213 01:49:04.267042 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.267051 kubelet[2063]: E1213 01:49:04.267051 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.267186 kubelet[2063]: E1213 01:49:04.267163 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.267186 kubelet[2063]: W1213 01:49:04.267168 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.267186 kubelet[2063]: E1213 01:49:04.267176 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.267294 kubelet[2063]: E1213 01:49:04.267273 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.267294 kubelet[2063]: W1213 01:49:04.267284 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.267294 kubelet[2063]: E1213 01:49:04.267291 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.267430 env[1206]: time="2024-12-13T01:49:04.267264506Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8495f899bf-wdrhp,Uid:c16e6336-5a44-4dcb-8446-0103e9ffae13,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:04.276127 kubelet[2063]: E1213 01:49:04.275997 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.276127 kubelet[2063]: W1213 01:49:04.276020 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.276127 kubelet[2063]: E1213 01:49:04.276063 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.276127 kubelet[2063]: I1213 01:49:04.276111 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hskpf\" (UniqueName: \"kubernetes.io/projected/1909b05f-26da-4b80-8a43-155547fbfec0-kube-api-access-hskpf\") pod \"csi-node-driver-7cxjh\" (UID: \"1909b05f-26da-4b80-8a43-155547fbfec0\") " pod="calico-system/csi-node-driver-7cxjh" Dec 13 01:49:04.276574 kubelet[2063]: E1213 01:49:04.276559 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.276660 kubelet[2063]: W1213 01:49:04.276643 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.277308 kubelet[2063]: E1213 01:49:04.276723 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.277308 kubelet[2063]: I1213 01:49:04.276752 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1909b05f-26da-4b80-8a43-155547fbfec0-socket-dir\") pod \"csi-node-driver-7cxjh\" (UID: \"1909b05f-26da-4b80-8a43-155547fbfec0\") " pod="calico-system/csi-node-driver-7cxjh" Dec 13 01:49:04.277308 kubelet[2063]: E1213 01:49:04.276999 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.277308 kubelet[2063]: W1213 01:49:04.277010 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.277308 kubelet[2063]: E1213 01:49:04.277029 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.277308 kubelet[2063]: I1213 01:49:04.277051 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1909b05f-26da-4b80-8a43-155547fbfec0-registration-dir\") pod \"csi-node-driver-7cxjh\" (UID: \"1909b05f-26da-4b80-8a43-155547fbfec0\") " pod="calico-system/csi-node-driver-7cxjh" Dec 13 01:49:04.277308 kubelet[2063]: E1213 01:49:04.277241 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.277308 kubelet[2063]: W1213 01:49:04.277252 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.277619 kubelet[2063]: E1213 01:49:04.277602 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.277853 kubelet[2063]: I1213 01:49:04.277838 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1909b05f-26da-4b80-8a43-155547fbfec0-kubelet-dir\") pod \"csi-node-driver-7cxjh\" (UID: \"1909b05f-26da-4b80-8a43-155547fbfec0\") " pod="calico-system/csi-node-driver-7cxjh" Dec 13 01:49:04.278026 kubelet[2063]: E1213 01:49:04.277986 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.278125 kubelet[2063]: W1213 01:49:04.278110 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.278213 kubelet[2063]: E1213 01:49:04.278197 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.278499 kubelet[2063]: E1213 01:49:04.278484 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.278613 kubelet[2063]: W1213 01:49:04.278596 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.278707 kubelet[2063]: E1213 01:49:04.278692 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.278978 kubelet[2063]: E1213 01:49:04.278966 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.279075 kubelet[2063]: W1213 01:49:04.279044 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.279167 kubelet[2063]: E1213 01:49:04.279153 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.279512 kubelet[2063]: E1213 01:49:04.279498 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.279620 kubelet[2063]: W1213 01:49:04.279603 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.279711 kubelet[2063]: E1213 01:49:04.279699 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.279941 kubelet[2063]: E1213 01:49:04.279930 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.280015 kubelet[2063]: W1213 01:49:04.280001 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.280106 kubelet[2063]: E1213 01:49:04.280094 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.280202 kubelet[2063]: I1213 01:49:04.280188 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1909b05f-26da-4b80-8a43-155547fbfec0-varrun\") pod \"csi-node-driver-7cxjh\" (UID: \"1909b05f-26da-4b80-8a43-155547fbfec0\") " pod="calico-system/csi-node-driver-7cxjh" Dec 13 01:49:04.280429 kubelet[2063]: E1213 01:49:04.280417 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.280503 kubelet[2063]: W1213 01:49:04.280487 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.280615 kubelet[2063]: E1213 01:49:04.280600 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.280858 kubelet[2063]: E1213 01:49:04.280846 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.280944 kubelet[2063]: W1213 01:49:04.280927 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.281038 kubelet[2063]: E1213 01:49:04.281025 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.281278 kubelet[2063]: E1213 01:49:04.281268 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.281356 kubelet[2063]: W1213 01:49:04.281342 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.281435 kubelet[2063]: E1213 01:49:04.281422 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.281668 kubelet[2063]: E1213 01:49:04.281658 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.281745 kubelet[2063]: W1213 01:49:04.281731 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.281822 kubelet[2063]: E1213 01:49:04.281809 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.282043 kubelet[2063]: E1213 01:49:04.282033 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.282128 kubelet[2063]: W1213 01:49:04.282114 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.282207 kubelet[2063]: E1213 01:49:04.282194 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.282422 kubelet[2063]: E1213 01:49:04.282410 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.282500 kubelet[2063]: W1213 01:49:04.282485 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.282638 kubelet[2063]: E1213 01:49:04.282625 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.290094 env[1206]: time="2024-12-13T01:49:04.290022380Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:04.290094 env[1206]: time="2024-12-13T01:49:04.290056653Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:04.290285 env[1206]: time="2024-12-13T01:49:04.290095594Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:04.290362 env[1206]: time="2024-12-13T01:49:04.290293700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb1de05f7018c40ae01af705bc9703f1635c940ce6e31b336d905e6f9c84a488 pid=2500 runtime=io.containerd.runc.v2 Dec 13 01:49:04.300033 systemd[1]: Started cri-containerd-bb1de05f7018c40ae01af705bc9703f1635c940ce6e31b336d905e6f9c84a488.scope. Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit: BPF prog-id=118 op=LOAD Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2500 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316465303566373031386334306165303161663730356263393730 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2500 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316465303566373031386334306165303161663730356263393730 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit: BPF prog-id=119 op=LOAD Dec 13 01:49:04.313000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000258a0 items=0 ppid=2500 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316465303566373031386334306165303161663730356263393730 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit: BPF prog-id=120 op=LOAD Dec 13 01:49:04.313000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000258e8 items=0 ppid=2500 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316465303566373031386334306165303161663730356263393730 Dec 13 01:49:04.313000 audit: BPF prog-id=120 op=UNLOAD Dec 13 01:49:04.313000 audit: BPF prog-id=119 op=UNLOAD Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.313000 audit: BPF prog-id=121 op=LOAD Dec 13 01:49:04.313000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025cf8 items=0 ppid=2500 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316465303566373031386334306165303161663730356263393730 Dec 13 01:49:04.317918 kubelet[2063]: E1213 01:49:04.316266 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:04.318312 env[1206]: time="2024-12-13T01:49:04.318274920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wbhns,Uid:6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:04.345274 env[1206]: time="2024-12-13T01:49:04.345102227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:04.345274 env[1206]: time="2024-12-13T01:49:04.345148836Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:04.345274 env[1206]: time="2024-12-13T01:49:04.345160780Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:04.345584 env[1206]: time="2024-12-13T01:49:04.345322721Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9f3afe2dfb4918f9a0dd060663bf2d8acaa0c99796938da5987d7dadae10e3e pid=2536 runtime=io.containerd.runc.v2 Dec 13 01:49:04.347168 env[1206]: time="2024-12-13T01:49:04.347125275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8495f899bf-wdrhp,Uid:c16e6336-5a44-4dcb-8446-0103e9ffae13,Namespace:calico-system,Attempt:0,} returns sandbox id \"bb1de05f7018c40ae01af705bc9703f1635c940ce6e31b336d905e6f9c84a488\"" Dec 13 01:49:04.347878 kubelet[2063]: E1213 01:49:04.347811 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:04.349110 env[1206]: time="2024-12-13T01:49:04.349086272Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 01:49:04.359436 systemd[1]: Started cri-containerd-d9f3afe2dfb4918f9a0dd060663bf2d8acaa0c99796938da5987d7dadae10e3e.scope. Dec 13 01:49:04.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit: BPF prog-id=122 op=LOAD Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2536 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439663361666532646662343931386639613064643036303636336266 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2536 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439663361666532646662343931386639613064643036303636336266 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit: BPF prog-id=123 op=LOAD Dec 13 01:49:04.371000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c3b60 items=0 ppid=2536 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439663361666532646662343931386639613064643036303636336266 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit: BPF prog-id=124 op=LOAD Dec 13 01:49:04.371000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c3ba8 items=0 ppid=2536 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439663361666532646662343931386639613064643036303636336266 Dec 13 01:49:04.371000 audit: BPF prog-id=124 op=UNLOAD Dec 13 01:49:04.371000 audit: BPF prog-id=123 op=UNLOAD Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:04.371000 audit: BPF prog-id=125 op=LOAD Dec 13 01:49:04.371000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002c3fb8 items=0 ppid=2536 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439663361666532646662343931386639613064643036303636336266 Dec 13 01:49:04.383879 env[1206]: time="2024-12-13T01:49:04.383759709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wbhns,Uid:6830a0b1-ccd3-4b58-ab45-9f0c4abc0c3a,Namespace:calico-system,Attempt:0,} returns sandbox id \"d9f3afe2dfb4918f9a0dd060663bf2d8acaa0c99796938da5987d7dadae10e3e\"" Dec 13 01:49:04.384600 kubelet[2063]: E1213 01:49:04.384566 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.384600 kubelet[2063]: W1213 01:49:04.384585 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.384782 kubelet[2063]: E1213 01:49:04.384614 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.384782 kubelet[2063]: E1213 01:49:04.384741 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:04.384914 kubelet[2063]: E1213 01:49:04.384888 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.384914 kubelet[2063]: W1213 01:49:04.384897 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.384914 kubelet[2063]: E1213 01:49:04.384913 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.385566 kubelet[2063]: E1213 01:49:04.385550 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.385566 kubelet[2063]: W1213 01:49:04.385562 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.385566 kubelet[2063]: E1213 01:49:04.385582 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.385836 kubelet[2063]: E1213 01:49:04.385787 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.385836 kubelet[2063]: W1213 01:49:04.385797 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.385836 kubelet[2063]: E1213 01:49:04.385810 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.386066 kubelet[2063]: E1213 01:49:04.386045 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.386066 kubelet[2063]: W1213 01:49:04.386063 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.386179 kubelet[2063]: E1213 01:49:04.386082 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.387217 kubelet[2063]: E1213 01:49:04.387203 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.387287 kubelet[2063]: W1213 01:49:04.387218 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.387287 kubelet[2063]: E1213 01:49:04.387240 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.387502 kubelet[2063]: E1213 01:49:04.387476 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.387502 kubelet[2063]: W1213 01:49:04.387499 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.387618 kubelet[2063]: E1213 01:49:04.387607 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.387700 kubelet[2063]: E1213 01:49:04.387689 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.387788 kubelet[2063]: W1213 01:49:04.387701 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.387880 kubelet[2063]: E1213 01:49:04.387802 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.387880 kubelet[2063]: E1213 01:49:04.387867 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.387880 kubelet[2063]: W1213 01:49:04.387875 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.388120 kubelet[2063]: E1213 01:49:04.387967 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.388120 kubelet[2063]: E1213 01:49:04.388057 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.388120 kubelet[2063]: W1213 01:49:04.388066 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.388350 kubelet[2063]: E1213 01:49:04.388169 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.388350 kubelet[2063]: E1213 01:49:04.388241 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.388350 kubelet[2063]: W1213 01:49:04.388248 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.388674 kubelet[2063]: E1213 01:49:04.388656 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.388728 kubelet[2063]: E1213 01:49:04.388715 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.388728 kubelet[2063]: W1213 01:49:04.388724 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.388889 kubelet[2063]: E1213 01:49:04.388736 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.388999 kubelet[2063]: E1213 01:49:04.388985 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.388999 kubelet[2063]: W1213 01:49:04.388997 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.389156 kubelet[2063]: E1213 01:49:04.389101 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.389240 kubelet[2063]: E1213 01:49:04.389214 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.389240 kubelet[2063]: W1213 01:49:04.389224 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.389410 kubelet[2063]: E1213 01:49:04.389315 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.389410 kubelet[2063]: E1213 01:49:04.389401 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.389410 kubelet[2063]: W1213 01:49:04.389410 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.389670 kubelet[2063]: E1213 01:49:04.389507 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.389670 kubelet[2063]: E1213 01:49:04.389622 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.389670 kubelet[2063]: W1213 01:49:04.389631 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.389784 kubelet[2063]: E1213 01:49:04.389727 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.389824 kubelet[2063]: E1213 01:49:04.389800 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.389824 kubelet[2063]: W1213 01:49:04.389810 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.389896 kubelet[2063]: E1213 01:49:04.389825 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.389998 kubelet[2063]: E1213 01:49:04.389984 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.389998 kubelet[2063]: W1213 01:49:04.389995 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.390075 kubelet[2063]: E1213 01:49:04.390007 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.390196 kubelet[2063]: E1213 01:49:04.390183 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.390196 kubelet[2063]: W1213 01:49:04.390194 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.390271 kubelet[2063]: E1213 01:49:04.390210 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.390650 kubelet[2063]: E1213 01:49:04.390622 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.390744 kubelet[2063]: W1213 01:49:04.390645 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.391126 kubelet[2063]: E1213 01:49:04.391078 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.391624 kubelet[2063]: E1213 01:49:04.391605 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.391624 kubelet[2063]: W1213 01:49:04.391621 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.391798 kubelet[2063]: E1213 01:49:04.391649 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.391917 kubelet[2063]: E1213 01:49:04.391902 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.391917 kubelet[2063]: W1213 01:49:04.391913 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.392226 kubelet[2063]: E1213 01:49:04.391973 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.392226 kubelet[2063]: E1213 01:49:04.392180 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.392226 kubelet[2063]: W1213 01:49:04.392190 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.392226 kubelet[2063]: E1213 01:49:04.392226 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.392493 kubelet[2063]: E1213 01:49:04.392394 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.392493 kubelet[2063]: W1213 01:49:04.392405 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.392493 kubelet[2063]: E1213 01:49:04.392423 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.392729 kubelet[2063]: E1213 01:49:04.392623 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.392729 kubelet[2063]: W1213 01:49:04.392636 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.392729 kubelet[2063]: E1213 01:49:04.392652 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.396423 kubelet[2063]: E1213 01:49:04.396409 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:04.396490 kubelet[2063]: W1213 01:49:04.396423 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:04.396490 kubelet[2063]: E1213 01:49:04.396441 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:04.830000 audit[2603]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:04.830000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdc00ad330 a2=0 a3=7ffdc00ad31c items=0 ppid=2224 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:04.838000 audit[2603]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:04.838000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc00ad330 a2=0 a3=0 items=0 ppid=2224 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:04.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:05.719444 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2183656163.mount: Deactivated successfully. Dec 13 01:49:05.741191 kubelet[2063]: E1213 01:49:05.741124 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:07.331663 env[1206]: time="2024-12-13T01:49:07.331589311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:07.333659 env[1206]: time="2024-12-13T01:49:07.333582914Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:07.334999 env[1206]: time="2024-12-13T01:49:07.334950107Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:07.336311 env[1206]: time="2024-12-13T01:49:07.336278619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:07.336701 env[1206]: time="2024-12-13T01:49:07.336669691Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 01:49:07.337316 env[1206]: time="2024-12-13T01:49:07.337283287Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 01:49:07.346164 env[1206]: time="2024-12-13T01:49:07.346115157Z" level=info msg="CreateContainer within sandbox \"bb1de05f7018c40ae01af705bc9703f1635c940ce6e31b336d905e6f9c84a488\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 01:49:07.361665 env[1206]: time="2024-12-13T01:49:07.361588603Z" level=info msg="CreateContainer within sandbox \"bb1de05f7018c40ae01af705bc9703f1635c940ce6e31b336d905e6f9c84a488\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"5f9006bfaf103efee67b389e876956b87fd57758a6237a8df8f159dc54351162\"" Dec 13 01:49:07.362237 env[1206]: time="2024-12-13T01:49:07.362201237Z" level=info msg="StartContainer for \"5f9006bfaf103efee67b389e876956b87fd57758a6237a8df8f159dc54351162\"" Dec 13 01:49:07.381024 systemd[1]: Started cri-containerd-5f9006bfaf103efee67b389e876956b87fd57758a6237a8df8f159dc54351162.scope. Dec 13 01:49:07.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.395242 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 01:49:07.395313 kernel: audit: type=1400 audit(1734054547.393:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.401660 kernel: audit: type=1400 audit(1734054547.393:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.401776 kernel: audit: type=1400 audit(1734054547.393:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.408116 kernel: audit: type=1400 audit(1734054547.393:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.408167 kernel: audit: type=1400 audit(1734054547.393:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.415336 kernel: audit: type=1400 audit(1734054547.393:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.415412 kernel: audit: type=1400 audit(1734054547.393:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.422549 kernel: audit: type=1400 audit(1734054547.393:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.422597 kernel: audit: type=1400 audit(1734054547.393:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.429456 kernel: audit: type=1400 audit(1734054547.397:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.397000 audit: BPF prog-id=126 op=LOAD Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2500 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:07.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393030366266616631303365666565363762333839653837363935 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2500 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:07.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393030366266616631303365666565363762333839653837363935 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.398000 audit: BPF prog-id=127 op=LOAD Dec 13 01:49:07.398000 audit[2613]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032e180 items=0 ppid=2500 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:07.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393030366266616631303365666565363762333839653837363935 Dec 13 01:49:07.404000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.404000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.404000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.404000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.404000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.404000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.404000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.404000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.404000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.404000 audit: BPF prog-id=128 op=LOAD Dec 13 01:49:07.404000 audit[2613]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032e1c8 items=0 ppid=2500 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:07.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393030366266616631303365666565363762333839653837363935 Dec 13 01:49:07.411000 audit: BPF prog-id=128 op=UNLOAD Dec 13 01:49:07.411000 audit: BPF prog-id=127 op=UNLOAD Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:07.411000 audit: BPF prog-id=129 op=LOAD Dec 13 01:49:07.411000 audit[2613]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032e5d8 items=0 ppid=2500 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:07.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393030366266616631303365666565363762333839653837363935 Dec 13 01:49:07.458311 env[1206]: time="2024-12-13T01:49:07.458262982Z" level=info msg="StartContainer for \"5f9006bfaf103efee67b389e876956b87fd57758a6237a8df8f159dc54351162\" returns successfully" Dec 13 01:49:07.741761 kubelet[2063]: E1213 01:49:07.741702 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:07.788952 kubelet[2063]: E1213 01:49:07.788907 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:07.796032 kubelet[2063]: E1213 01:49:07.795991 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.796032 kubelet[2063]: W1213 01:49:07.796017 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.796269 kubelet[2063]: E1213 01:49:07.796046 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.796314 kubelet[2063]: E1213 01:49:07.796283 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.796314 kubelet[2063]: W1213 01:49:07.796292 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.796314 kubelet[2063]: E1213 01:49:07.796305 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.796538 kubelet[2063]: E1213 01:49:07.796504 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.796538 kubelet[2063]: W1213 01:49:07.796533 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.796538 kubelet[2063]: E1213 01:49:07.796548 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.796815 kubelet[2063]: E1213 01:49:07.796736 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.796815 kubelet[2063]: W1213 01:49:07.796744 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.796815 kubelet[2063]: E1213 01:49:07.796755 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.796943 kubelet[2063]: E1213 01:49:07.796924 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.796943 kubelet[2063]: W1213 01:49:07.796939 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.797017 kubelet[2063]: E1213 01:49:07.796951 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.797121 kubelet[2063]: E1213 01:49:07.797107 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.797121 kubelet[2063]: W1213 01:49:07.797117 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.797195 kubelet[2063]: E1213 01:49:07.797128 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.797293 kubelet[2063]: E1213 01:49:07.797279 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.797293 kubelet[2063]: W1213 01:49:07.797289 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.797369 kubelet[2063]: E1213 01:49:07.797303 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.797596 kubelet[2063]: E1213 01:49:07.797575 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.797596 kubelet[2063]: W1213 01:49:07.797589 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.797697 kubelet[2063]: E1213 01:49:07.797605 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.797883 kubelet[2063]: E1213 01:49:07.797851 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.797883 kubelet[2063]: W1213 01:49:07.797871 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.797883 kubelet[2063]: E1213 01:49:07.797884 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.798155 kubelet[2063]: E1213 01:49:07.798043 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.798155 kubelet[2063]: W1213 01:49:07.798058 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.798155 kubelet[2063]: E1213 01:49:07.798070 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.798283 kubelet[2063]: E1213 01:49:07.798203 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.798283 kubelet[2063]: W1213 01:49:07.798211 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.798283 kubelet[2063]: E1213 01:49:07.798223 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.798399 kubelet[2063]: E1213 01:49:07.798374 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.798399 kubelet[2063]: W1213 01:49:07.798395 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.798496 kubelet[2063]: E1213 01:49:07.798409 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.798605 kubelet[2063]: E1213 01:49:07.798586 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.798605 kubelet[2063]: W1213 01:49:07.798603 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.798708 kubelet[2063]: E1213 01:49:07.798620 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.798814 kubelet[2063]: E1213 01:49:07.798797 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.798814 kubelet[2063]: W1213 01:49:07.798810 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.798914 kubelet[2063]: E1213 01:49:07.798828 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.799008 kubelet[2063]: E1213 01:49:07.798993 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.799094 kubelet[2063]: W1213 01:49:07.799076 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.799187 kubelet[2063]: E1213 01:49:07.799166 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.811828 kubelet[2063]: E1213 01:49:07.811796 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.811828 kubelet[2063]: W1213 01:49:07.811816 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.811978 kubelet[2063]: E1213 01:49:07.811838 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.812048 kubelet[2063]: E1213 01:49:07.812030 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.812048 kubelet[2063]: W1213 01:49:07.812044 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.812117 kubelet[2063]: E1213 01:49:07.812067 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.812237 kubelet[2063]: E1213 01:49:07.812220 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.812237 kubelet[2063]: W1213 01:49:07.812233 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.812457 kubelet[2063]: E1213 01:49:07.812249 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.812534 kubelet[2063]: E1213 01:49:07.812497 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.812574 kubelet[2063]: W1213 01:49:07.812538 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.812616 kubelet[2063]: E1213 01:49:07.812573 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.812817 kubelet[2063]: E1213 01:49:07.812801 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.812817 kubelet[2063]: W1213 01:49:07.812811 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.812888 kubelet[2063]: E1213 01:49:07.812826 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.812975 kubelet[2063]: E1213 01:49:07.812962 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.812975 kubelet[2063]: W1213 01:49:07.812970 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.813042 kubelet[2063]: E1213 01:49:07.812983 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.813107 kubelet[2063]: E1213 01:49:07.813095 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.813107 kubelet[2063]: W1213 01:49:07.813103 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.813175 kubelet[2063]: E1213 01:49:07.813117 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.813319 kubelet[2063]: E1213 01:49:07.813306 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.813319 kubelet[2063]: W1213 01:49:07.813317 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.813396 kubelet[2063]: E1213 01:49:07.813338 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.813543 kubelet[2063]: E1213 01:49:07.813512 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.813543 kubelet[2063]: W1213 01:49:07.813538 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.813621 kubelet[2063]: E1213 01:49:07.813560 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.813789 kubelet[2063]: E1213 01:49:07.813773 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.813789 kubelet[2063]: W1213 01:49:07.813784 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.813858 kubelet[2063]: E1213 01:49:07.813803 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.814064 kubelet[2063]: E1213 01:49:07.814050 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.814064 kubelet[2063]: W1213 01:49:07.814061 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.814151 kubelet[2063]: E1213 01:49:07.814082 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.814287 kubelet[2063]: E1213 01:49:07.814275 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.814287 kubelet[2063]: W1213 01:49:07.814284 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.814361 kubelet[2063]: E1213 01:49:07.814320 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.814509 kubelet[2063]: E1213 01:49:07.814496 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.814509 kubelet[2063]: W1213 01:49:07.814506 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.814601 kubelet[2063]: E1213 01:49:07.814552 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.814747 kubelet[2063]: E1213 01:49:07.814712 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.814747 kubelet[2063]: W1213 01:49:07.814738 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.814895 kubelet[2063]: E1213 01:49:07.814759 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.814978 kubelet[2063]: E1213 01:49:07.814963 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.814978 kubelet[2063]: W1213 01:49:07.814975 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.815035 kubelet[2063]: E1213 01:49:07.814994 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.815197 kubelet[2063]: E1213 01:49:07.815184 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.815197 kubelet[2063]: W1213 01:49:07.815194 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.815247 kubelet[2063]: E1213 01:49:07.815209 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.815512 kubelet[2063]: E1213 01:49:07.815490 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.815512 kubelet[2063]: W1213 01:49:07.815507 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.815649 kubelet[2063]: E1213 01:49:07.815540 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:07.815731 kubelet[2063]: E1213 01:49:07.815706 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:07.815731 kubelet[2063]: W1213 01:49:07.815718 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:07.815803 kubelet[2063]: E1213 01:49:07.815738 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.789139 env[1206]: time="2024-12-13T01:49:08.789080287Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:08.790017 kubelet[2063]: I1213 01:49:08.789995 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:49:08.790623 kubelet[2063]: E1213 01:49:08.790605 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:08.791048 env[1206]: time="2024-12-13T01:49:08.791020789Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:08.792728 env[1206]: time="2024-12-13T01:49:08.792690720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:08.794332 env[1206]: time="2024-12-13T01:49:08.794293332Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:08.794980 env[1206]: time="2024-12-13T01:49:08.794927176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 01:49:08.796425 env[1206]: time="2024-12-13T01:49:08.796390028Z" level=info msg="CreateContainer within sandbox \"d9f3afe2dfb4918f9a0dd060663bf2d8acaa0c99796938da5987d7dadae10e3e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 01:49:08.807332 kubelet[2063]: E1213 01:49:08.806997 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.807332 kubelet[2063]: W1213 01:49:08.807016 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.807332 kubelet[2063]: E1213 01:49:08.807036 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.807332 kubelet[2063]: E1213 01:49:08.807205 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.807332 kubelet[2063]: W1213 01:49:08.807213 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.807332 kubelet[2063]: E1213 01:49:08.807225 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.807623 kubelet[2063]: E1213 01:49:08.807359 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.807623 kubelet[2063]: W1213 01:49:08.807366 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.807623 kubelet[2063]: E1213 01:49:08.807374 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.807623 kubelet[2063]: E1213 01:49:08.807498 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.807623 kubelet[2063]: W1213 01:49:08.807503 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.807623 kubelet[2063]: E1213 01:49:08.807528 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.807808 kubelet[2063]: E1213 01:49:08.807655 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.807808 kubelet[2063]: W1213 01:49:08.807664 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.807808 kubelet[2063]: E1213 01:49:08.807673 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.807808 kubelet[2063]: E1213 01:49:08.807800 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.807808 kubelet[2063]: W1213 01:49:08.807806 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.807808 kubelet[2063]: E1213 01:49:08.807815 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.808020 kubelet[2063]: E1213 01:49:08.807954 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.808020 kubelet[2063]: W1213 01:49:08.807962 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.808020 kubelet[2063]: E1213 01:49:08.807971 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.808114 kubelet[2063]: E1213 01:49:08.808075 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.808114 kubelet[2063]: W1213 01:49:08.808082 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.808114 kubelet[2063]: E1213 01:49:08.808090 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.808206 kubelet[2063]: E1213 01:49:08.808190 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.808206 kubelet[2063]: W1213 01:49:08.808196 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.808206 kubelet[2063]: E1213 01:49:08.808203 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.808317 kubelet[2063]: E1213 01:49:08.808293 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.808317 kubelet[2063]: W1213 01:49:08.808298 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.808317 kubelet[2063]: E1213 01:49:08.808305 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.808423 kubelet[2063]: E1213 01:49:08.808389 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.808423 kubelet[2063]: W1213 01:49:08.808394 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.808423 kubelet[2063]: E1213 01:49:08.808402 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.808538 kubelet[2063]: E1213 01:49:08.808491 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.808538 kubelet[2063]: W1213 01:49:08.808497 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.808538 kubelet[2063]: E1213 01:49:08.808505 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.808648 kubelet[2063]: E1213 01:49:08.808631 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.808648 kubelet[2063]: W1213 01:49:08.808639 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.808648 kubelet[2063]: E1213 01:49:08.808651 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.808792 kubelet[2063]: E1213 01:49:08.808774 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.808792 kubelet[2063]: W1213 01:49:08.808782 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.808792 kubelet[2063]: E1213 01:49:08.808800 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.809031 kubelet[2063]: E1213 01:49:08.808911 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.809031 kubelet[2063]: W1213 01:49:08.808916 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.809031 kubelet[2063]: E1213 01:49:08.808923 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.809820 env[1206]: time="2024-12-13T01:49:08.809785665Z" level=info msg="CreateContainer within sandbox \"d9f3afe2dfb4918f9a0dd060663bf2d8acaa0c99796938da5987d7dadae10e3e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"90ff33ba4f1633cdb4b428ba8a1ecc3aea0b795178f046609418d883bbb2b83f\"" Dec 13 01:49:08.810266 env[1206]: time="2024-12-13T01:49:08.810240418Z" level=info msg="StartContainer for \"90ff33ba4f1633cdb4b428ba8a1ecc3aea0b795178f046609418d883bbb2b83f\"" Dec 13 01:49:08.822347 kubelet[2063]: E1213 01:49:08.822319 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.822347 kubelet[2063]: W1213 01:49:08.822339 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.822584 kubelet[2063]: E1213 01:49:08.822363 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.822626 kubelet[2063]: E1213 01:49:08.822619 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.822661 kubelet[2063]: W1213 01:49:08.822628 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.822661 kubelet[2063]: E1213 01:49:08.822641 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.822875 kubelet[2063]: E1213 01:49:08.822854 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.822875 kubelet[2063]: W1213 01:49:08.822869 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.822875 kubelet[2063]: E1213 01:49:08.822881 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.823119 kubelet[2063]: E1213 01:49:08.823082 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.823119 kubelet[2063]: W1213 01:49:08.823097 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.823119 kubelet[2063]: E1213 01:49:08.823111 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.823351 kubelet[2063]: E1213 01:49:08.823328 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.823351 kubelet[2063]: W1213 01:49:08.823343 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.823457 kubelet[2063]: E1213 01:49:08.823358 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.823582 kubelet[2063]: E1213 01:49:08.823548 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.823582 kubelet[2063]: W1213 01:49:08.823562 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.823582 kubelet[2063]: E1213 01:49:08.823576 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.823799 kubelet[2063]: E1213 01:49:08.823776 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.823799 kubelet[2063]: W1213 01:49:08.823790 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.823917 kubelet[2063]: E1213 01:49:08.823870 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.824134 kubelet[2063]: E1213 01:49:08.824100 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.824134 kubelet[2063]: W1213 01:49:08.824115 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.824216 kubelet[2063]: E1213 01:49:08.824175 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.824352 kubelet[2063]: E1213 01:49:08.824316 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.824352 kubelet[2063]: W1213 01:49:08.824331 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.824444 kubelet[2063]: E1213 01:49:08.824417 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.828772 systemd[1]: Started cri-containerd-90ff33ba4f1633cdb4b428ba8a1ecc3aea0b795178f046609418d883bbb2b83f.scope. Dec 13 01:49:08.829284 kubelet[2063]: E1213 01:49:08.828862 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.829284 kubelet[2063]: W1213 01:49:08.828881 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.829284 kubelet[2063]: E1213 01:49:08.828924 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.829284 kubelet[2063]: E1213 01:49:08.829103 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.829284 kubelet[2063]: W1213 01:49:08.829109 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.829284 kubelet[2063]: E1213 01:49:08.829127 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.829469 kubelet[2063]: E1213 01:49:08.829367 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.829469 kubelet[2063]: W1213 01:49:08.829374 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.829469 kubelet[2063]: E1213 01:49:08.829437 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.829600 kubelet[2063]: E1213 01:49:08.829524 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.829600 kubelet[2063]: W1213 01:49:08.829529 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.829600 kubelet[2063]: E1213 01:49:08.829539 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.829710 kubelet[2063]: E1213 01:49:08.829684 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.829710 kubelet[2063]: W1213 01:49:08.829690 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.829710 kubelet[2063]: E1213 01:49:08.829700 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.829966 kubelet[2063]: E1213 01:49:08.829944 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.829966 kubelet[2063]: W1213 01:49:08.829956 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.830044 kubelet[2063]: E1213 01:49:08.829968 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.830343 kubelet[2063]: E1213 01:49:08.830326 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.830343 kubelet[2063]: W1213 01:49:08.830341 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.830432 kubelet[2063]: E1213 01:49:08.830357 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.831486 kubelet[2063]: E1213 01:49:08.830559 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.831486 kubelet[2063]: W1213 01:49:08.830573 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.831486 kubelet[2063]: E1213 01:49:08.830588 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.831486 kubelet[2063]: E1213 01:49:08.831111 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:08.831486 kubelet[2063]: W1213 01:49:08.831120 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:08.831486 kubelet[2063]: E1213 01:49:08.831134 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:08.837000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.837000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe4672989f8 items=0 ppid=2536 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:08.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666633336261346631363333636462346234323862613861316563 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit: BPF prog-id=130 op=LOAD Dec 13 01:49:08.838000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00032aae8 items=0 ppid=2536 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:08.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666633336261346631363333636462346234323862613861316563 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit: BPF prog-id=131 op=LOAD Dec 13 01:49:08.838000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00032ab38 items=0 ppid=2536 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:08.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666633336261346631363333636462346234323862613861316563 Dec 13 01:49:08.838000 audit: BPF prog-id=131 op=UNLOAD Dec 13 01:49:08.838000 audit: BPF prog-id=130 op=UNLOAD Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:08.838000 audit: BPF prog-id=132 op=LOAD Dec 13 01:49:08.838000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00032abc8 items=0 ppid=2536 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:08.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666633336261346631363333636462346234323862613861316563 Dec 13 01:49:08.853577 env[1206]: time="2024-12-13T01:49:08.853533958Z" level=info msg="StartContainer for \"90ff33ba4f1633cdb4b428ba8a1ecc3aea0b795178f046609418d883bbb2b83f\" returns successfully" Dec 13 01:49:08.859536 systemd[1]: cri-containerd-90ff33ba4f1633cdb4b428ba8a1ecc3aea0b795178f046609418d883bbb2b83f.scope: Deactivated successfully. Dec 13 01:49:08.863000 audit: BPF prog-id=132 op=UNLOAD Dec 13 01:49:09.341390 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-90ff33ba4f1633cdb4b428ba8a1ecc3aea0b795178f046609418d883bbb2b83f-rootfs.mount: Deactivated successfully. Dec 13 01:49:09.584585 env[1206]: time="2024-12-13T01:49:09.584479592Z" level=info msg="shim disconnected" id=90ff33ba4f1633cdb4b428ba8a1ecc3aea0b795178f046609418d883bbb2b83f Dec 13 01:49:09.584585 env[1206]: time="2024-12-13T01:49:09.584586552Z" level=warning msg="cleaning up after shim disconnected" id=90ff33ba4f1633cdb4b428ba8a1ecc3aea0b795178f046609418d883bbb2b83f namespace=k8s.io Dec 13 01:49:09.584808 env[1206]: time="2024-12-13T01:49:09.584599219Z" level=info msg="cleaning up dead shim" Dec 13 01:49:09.598347 env[1206]: time="2024-12-13T01:49:09.598038701Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2756 runtime=io.containerd.runc.v2\n" Dec 13 01:49:09.741874 kubelet[2063]: E1213 01:49:09.741813 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:09.792765 kubelet[2063]: E1213 01:49:09.792731 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:09.793721 env[1206]: time="2024-12-13T01:49:09.793687513Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 01:49:09.805339 kubelet[2063]: I1213 01:49:09.805290 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-8495f899bf-wdrhp" podStartSLOduration=3.817074749 podStartE2EDuration="6.80524766s" podCreationTimestamp="2024-12-13 01:49:03 +0000 UTC" firstStartedPulling="2024-12-13 01:49:04.348832669 +0000 UTC m=+22.694986539" lastFinishedPulling="2024-12-13 01:49:07.33700558 +0000 UTC m=+25.683159450" observedRunningTime="2024-12-13 01:49:07.799425057 +0000 UTC m=+26.145578957" watchObservedRunningTime="2024-12-13 01:49:09.80524766 +0000 UTC m=+28.151401530" Dec 13 01:49:09.936353 systemd[1]: Started sshd@7-10.0.0.22:22-10.0.0.1:40180.service. Dec 13 01:49:09.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.22:22-10.0.0.1:40180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:09.973000 audit[2774]: USER_ACCT pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:09.975316 sshd[2774]: Accepted publickey for core from 10.0.0.1 port 40180 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:09.974000 audit[2774]: CRED_ACQ pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:09.974000 audit[2774]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd971d9020 a2=3 a3=0 items=0 ppid=1 pid=2774 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:09.974000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:09.976488 sshd[2774]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:09.980073 systemd-logind[1192]: New session 8 of user core. Dec 13 01:49:09.980840 systemd[1]: Started session-8.scope. Dec 13 01:49:09.983000 audit[2774]: USER_START pid=2774 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:09.984000 audit[2776]: CRED_ACQ pid=2776 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:10.095897 sshd[2774]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:10.095000 audit[2774]: USER_END pid=2774 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:10.095000 audit[2774]: CRED_DISP pid=2774 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:10.098031 systemd[1]: sshd@7-10.0.0.22:22-10.0.0.1:40180.service: Deactivated successfully. Dec 13 01:49:10.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.22:22-10.0.0.1:40180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:10.098772 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 01:49:10.099311 systemd-logind[1192]: Session 8 logged out. Waiting for processes to exit. Dec 13 01:49:10.099976 systemd-logind[1192]: Removed session 8. Dec 13 01:49:11.163475 kubelet[2063]: I1213 01:49:11.163433 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:49:11.165179 kubelet[2063]: E1213 01:49:11.164661 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:11.182000 audit[2789]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:11.182000 audit[2789]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdbc9bea90 a2=0 a3=7ffdbc9bea7c items=0 ppid=2224 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:11.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:11.190000 audit[2789]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:11.190000 audit[2789]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdbc9bea90 a2=0 a3=7ffdbc9bea7c items=0 ppid=2224 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:11.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:11.741245 kubelet[2063]: E1213 01:49:11.741195 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:11.795205 kubelet[2063]: E1213 01:49:11.795180 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:13.744235 kubelet[2063]: E1213 01:49:13.744202 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:15.100762 systemd[1]: Started sshd@8-10.0.0.22:22-10.0.0.1:40196.service. Dec 13 01:49:15.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.22:22-10.0.0.1:40196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:15.102028 kernel: kauditd_printk_skb: 108 callbacks suppressed Dec 13 01:49:15.102081 kernel: audit: type=1130 audit(1734054555.099:1010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.22:22-10.0.0.1:40196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:15.186033 kubelet[2063]: E1213 01:49:15.185991 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:15.211000 audit[2793]: USER_ACCT pid=2793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.213126 sshd[2793]: Accepted publickey for core from 10.0.0.1 port 40196 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:15.215074 sshd[2793]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:15.220123 systemd[1]: Started session-9.scope. Dec 13 01:49:15.220467 systemd-logind[1192]: New session 9 of user core. Dec 13 01:49:15.213000 audit[2793]: CRED_ACQ pid=2793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.225555 kernel: audit: type=1101 audit(1734054555.211:1011): pid=2793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.225641 kernel: audit: type=1103 audit(1734054555.213:1012): pid=2793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.225678 kernel: audit: type=1006 audit(1734054555.213:1013): pid=2793 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 01:49:15.213000 audit[2793]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c91b160 a2=3 a3=0 items=0 ppid=1 pid=2793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:15.234270 kernel: audit: type=1300 audit(1734054555.213:1013): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c91b160 a2=3 a3=0 items=0 ppid=1 pid=2793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:15.234321 kernel: audit: type=1327 audit(1734054555.213:1013): proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:15.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:15.224000 audit[2793]: USER_START pid=2793 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.239863 kernel: audit: type=1105 audit(1734054555.224:1014): pid=2793 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.239920 kernel: audit: type=1103 audit(1734054555.225:1015): pid=2795 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.225000 audit[2795]: CRED_ACQ pid=2795 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.340164 sshd[2793]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:15.339000 audit[2793]: USER_END pid=2793 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.345000 audit[2793]: CRED_DISP pid=2793 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.353544 kernel: audit: type=1106 audit(1734054555.339:1016): pid=2793 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.353617 kernel: audit: type=1104 audit(1734054555.345:1017): pid=2793 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:15.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.22:22-10.0.0.1:40196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:15.355044 systemd[1]: sshd@8-10.0.0.22:22-10.0.0.1:40196.service: Deactivated successfully. Dec 13 01:49:15.355905 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 01:49:15.356974 systemd-logind[1192]: Session 9 logged out. Waiting for processes to exit. Dec 13 01:49:15.357736 systemd-logind[1192]: Removed session 9. Dec 13 01:49:16.741078 kubelet[2063]: E1213 01:49:16.741026 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:18.123645 env[1206]: time="2024-12-13T01:49:18.123582214Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:18.126280 env[1206]: time="2024-12-13T01:49:18.126207033Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:18.128016 env[1206]: time="2024-12-13T01:49:18.127982357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:18.130177 env[1206]: time="2024-12-13T01:49:18.130133805Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:18.130603 env[1206]: time="2024-12-13T01:49:18.130571584Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 01:49:18.132214 env[1206]: time="2024-12-13T01:49:18.132180411Z" level=info msg="CreateContainer within sandbox \"d9f3afe2dfb4918f9a0dd060663bf2d8acaa0c99796938da5987d7dadae10e3e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 01:49:18.151620 env[1206]: time="2024-12-13T01:49:18.151560686Z" level=info msg="CreateContainer within sandbox \"d9f3afe2dfb4918f9a0dd060663bf2d8acaa0c99796938da5987d7dadae10e3e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9df198fce5c6eee302975eb12091aa326e05dddcf67230c2ee5373e55199f3d9\"" Dec 13 01:49:18.152095 env[1206]: time="2024-12-13T01:49:18.152052434Z" level=info msg="StartContainer for \"9df198fce5c6eee302975eb12091aa326e05dddcf67230c2ee5373e55199f3d9\"" Dec 13 01:49:18.170855 systemd[1]: Started cri-containerd-9df198fce5c6eee302975eb12091aa326e05dddcf67230c2ee5373e55199f3d9.scope. Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f5df271a988 items=0 ppid=2536 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:18.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663139386663653563366565653330323937356562313230393161 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit: BPF prog-id=133 op=LOAD Dec 13 01:49:18.186000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0000e7ba8 items=0 ppid=2536 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:18.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663139386663653563366565653330323937356562313230393161 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit: BPF prog-id=134 op=LOAD Dec 13 01:49:18.186000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0000e7bf8 items=0 ppid=2536 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:18.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663139386663653563366565653330323937356562313230393161 Dec 13 01:49:18.186000 audit: BPF prog-id=134 op=UNLOAD Dec 13 01:49:18.186000 audit: BPF prog-id=133 op=UNLOAD Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:18.186000 audit: BPF prog-id=135 op=LOAD Dec 13 01:49:18.186000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0000e7c88 items=0 ppid=2536 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:18.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663139386663653563366565653330323937356562313230393161 Dec 13 01:49:18.502588 env[1206]: time="2024-12-13T01:49:18.502395078Z" level=info msg="StartContainer for \"9df198fce5c6eee302975eb12091aa326e05dddcf67230c2ee5373e55199f3d9\" returns successfully" Dec 13 01:49:18.740939 kubelet[2063]: E1213 01:49:18.740888 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:18.807544 kubelet[2063]: E1213 01:49:18.807437 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:19.808916 kubelet[2063]: E1213 01:49:19.808878 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:20.344712 systemd[1]: Started sshd@9-10.0.0.22:22-10.0.0.1:47018.service. Dec 13 01:49:20.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.22:22-10.0.0.1:47018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:20.345857 kernel: kauditd_printk_skb: 44 callbacks suppressed Dec 13 01:49:20.345909 kernel: audit: type=1130 audit(1734054560.344:1025): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.22:22-10.0.0.1:47018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:20.711000 audit[2844]: USER_ACCT pid=2844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.713642 sshd[2844]: Accepted publickey for core from 10.0.0.1 port 47018 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:20.717655 sshd[2844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:20.713000 audit[2844]: CRED_ACQ pid=2844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.721370 systemd-logind[1192]: New session 10 of user core. Dec 13 01:49:20.722051 systemd[1]: Started session-10.scope. Dec 13 01:49:20.724802 kernel: audit: type=1101 audit(1734054560.711:1026): pid=2844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.724859 kernel: audit: type=1103 audit(1734054560.713:1027): pid=2844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.724886 kernel: audit: type=1006 audit(1734054560.713:1028): pid=2844 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 01:49:20.713000 audit[2844]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc68487ff0 a2=3 a3=0 items=0 ppid=1 pid=2844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:20.730969 kernel: audit: type=1300 audit(1734054560.713:1028): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc68487ff0 a2=3 a3=0 items=0 ppid=1 pid=2844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:20.731014 kernel: audit: type=1327 audit(1734054560.713:1028): proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:20.713000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:20.725000 audit[2844]: USER_START pid=2844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.736423 kernel: audit: type=1105 audit(1734054560.725:1029): pid=2844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.736475 kernel: audit: type=1103 audit(1734054560.726:1030): pid=2846 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.726000 audit[2846]: CRED_ACQ pid=2846 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.740801 kubelet[2063]: E1213 01:49:20.740764 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:20.898690 sshd[2844]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:20.897000 audit[2844]: USER_END pid=2844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.901217 systemd[1]: sshd@9-10.0.0.22:22-10.0.0.1:47018.service: Deactivated successfully. Dec 13 01:49:20.901859 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 01:49:20.902493 systemd-logind[1192]: Session 10 logged out. Waiting for processes to exit. Dec 13 01:49:20.903379 systemd-logind[1192]: Removed session 10. Dec 13 01:49:20.898000 audit[2844]: CRED_DISP pid=2844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.914061 kernel: audit: type=1106 audit(1734054560.897:1031): pid=2844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.914100 kernel: audit: type=1104 audit(1734054560.898:1032): pid=2844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:20.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.22:22-10.0.0.1:47018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:21.533259 env[1206]: time="2024-12-13T01:49:21.533172847Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:49:21.535405 systemd[1]: cri-containerd-9df198fce5c6eee302975eb12091aa326e05dddcf67230c2ee5373e55199f3d9.scope: Deactivated successfully. Dec 13 01:49:21.538000 audit: BPF prog-id=135 op=UNLOAD Dec 13 01:49:21.551270 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9df198fce5c6eee302975eb12091aa326e05dddcf67230c2ee5373e55199f3d9-rootfs.mount: Deactivated successfully. Dec 13 01:49:21.616034 kubelet[2063]: I1213 01:49:21.616001 2063 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 01:49:21.755309 env[1206]: time="2024-12-13T01:49:21.755256905Z" level=info msg="shim disconnected" id=9df198fce5c6eee302975eb12091aa326e05dddcf67230c2ee5373e55199f3d9 Dec 13 01:49:21.755309 env[1206]: time="2024-12-13T01:49:21.755300904Z" level=warning msg="cleaning up after shim disconnected" id=9df198fce5c6eee302975eb12091aa326e05dddcf67230c2ee5373e55199f3d9 namespace=k8s.io Dec 13 01:49:21.755309 env[1206]: time="2024-12-13T01:49:21.755310052Z" level=info msg="cleaning up dead shim" Dec 13 01:49:21.761545 env[1206]: time="2024-12-13T01:49:21.761499216Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2869 runtime=io.containerd.runc.v2\n" Dec 13 01:49:21.802988 kubelet[2063]: I1213 01:49:21.802597 2063 topology_manager.go:215] "Topology Admit Handler" podUID="8e7884e0-a465-45d2-be86-19bfdd944b31" podNamespace="kube-system" podName="coredns-76f75df574-2b2ms" Dec 13 01:49:21.807749 kubelet[2063]: I1213 01:49:21.807714 2063 topology_manager.go:215] "Topology Admit Handler" podUID="3a0c5520-4e5d-444e-9889-cfefde6f6729" podNamespace="calico-apiserver" podName="calico-apiserver-8fbdb9594-795pg" Dec 13 01:49:21.808427 systemd[1]: Created slice kubepods-burstable-pod8e7884e0_a465_45d2_be86_19bfdd944b31.slice. Dec 13 01:49:21.812396 kubelet[2063]: I1213 01:49:21.812372 2063 topology_manager.go:215] "Topology Admit Handler" podUID="c9119358-2d09-4f2c-8607-50e91d5a8662" podNamespace="kube-system" podName="coredns-76f75df574-7pgvz" Dec 13 01:49:21.812922 kubelet[2063]: I1213 01:49:21.812895 2063 topology_manager.go:215] "Topology Admit Handler" podUID="3a146104-b9e8-40de-887c-c190d7aca84e" podNamespace="calico-apiserver" podName="calico-apiserver-8fbdb9594-5mmrr" Dec 13 01:49:21.814713 kubelet[2063]: I1213 01:49:21.814686 2063 topology_manager.go:215] "Topology Admit Handler" podUID="0d753e72-b10a-4daf-bc52-048e56a3d5fb" podNamespace="calico-system" podName="calico-kube-controllers-55f8cd8f6f-4t7m7" Dec 13 01:49:21.821010 systemd[1]: Created slice kubepods-besteffort-pod0d753e72_b10a_4daf_bc52_048e56a3d5fb.slice. Dec 13 01:49:21.821713 systemd[1]: Created slice kubepods-besteffort-pod3a0c5520_4e5d_444e_9889_cfefde6f6729.slice. Dec 13 01:49:21.831776 kubelet[2063]: E1213 01:49:21.831754 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:21.832455 env[1206]: time="2024-12-13T01:49:21.832410932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 01:49:21.833300 systemd[1]: Created slice kubepods-burstable-podc9119358_2d09_4f2c_8607_50e91d5a8662.slice. Dec 13 01:49:21.837285 systemd[1]: Created slice kubepods-besteffort-pod3a146104_b9e8_40de_887c_c190d7aca84e.slice. Dec 13 01:49:21.912909 kubelet[2063]: I1213 01:49:21.912839 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7pv2h\" (UniqueName: \"kubernetes.io/projected/c9119358-2d09-4f2c-8607-50e91d5a8662-kube-api-access-7pv2h\") pod \"coredns-76f75df574-7pgvz\" (UID: \"c9119358-2d09-4f2c-8607-50e91d5a8662\") " pod="kube-system/coredns-76f75df574-7pgvz" Dec 13 01:49:21.912909 kubelet[2063]: I1213 01:49:21.912886 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x9d9d\" (UniqueName: \"kubernetes.io/projected/8e7884e0-a465-45d2-be86-19bfdd944b31-kube-api-access-x9d9d\") pod \"coredns-76f75df574-2b2ms\" (UID: \"8e7884e0-a465-45d2-be86-19bfdd944b31\") " pod="kube-system/coredns-76f75df574-2b2ms" Dec 13 01:49:21.912909 kubelet[2063]: I1213 01:49:21.912928 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/3a146104-b9e8-40de-887c-c190d7aca84e-calico-apiserver-certs\") pod \"calico-apiserver-8fbdb9594-5mmrr\" (UID: \"3a146104-b9e8-40de-887c-c190d7aca84e\") " pod="calico-apiserver/calico-apiserver-8fbdb9594-5mmrr" Dec 13 01:49:21.913199 kubelet[2063]: I1213 01:49:21.913035 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-66vcm\" (UniqueName: \"kubernetes.io/projected/3a146104-b9e8-40de-887c-c190d7aca84e-kube-api-access-66vcm\") pod \"calico-apiserver-8fbdb9594-5mmrr\" (UID: \"3a146104-b9e8-40de-887c-c190d7aca84e\") " pod="calico-apiserver/calico-apiserver-8fbdb9594-5mmrr" Dec 13 01:49:21.913199 kubelet[2063]: I1213 01:49:21.913104 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-phfgt\" (UniqueName: \"kubernetes.io/projected/3a0c5520-4e5d-444e-9889-cfefde6f6729-kube-api-access-phfgt\") pod \"calico-apiserver-8fbdb9594-795pg\" (UID: \"3a0c5520-4e5d-444e-9889-cfefde6f6729\") " pod="calico-apiserver/calico-apiserver-8fbdb9594-795pg" Dec 13 01:49:21.913199 kubelet[2063]: I1213 01:49:21.913138 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0d753e72-b10a-4daf-bc52-048e56a3d5fb-tigera-ca-bundle\") pod \"calico-kube-controllers-55f8cd8f6f-4t7m7\" (UID: \"0d753e72-b10a-4daf-bc52-048e56a3d5fb\") " pod="calico-system/calico-kube-controllers-55f8cd8f6f-4t7m7" Dec 13 01:49:21.913199 kubelet[2063]: I1213 01:49:21.913178 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8e7884e0-a465-45d2-be86-19bfdd944b31-config-volume\") pod \"coredns-76f75df574-2b2ms\" (UID: \"8e7884e0-a465-45d2-be86-19bfdd944b31\") " pod="kube-system/coredns-76f75df574-2b2ms" Dec 13 01:49:21.913335 kubelet[2063]: I1213 01:49:21.913217 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c9119358-2d09-4f2c-8607-50e91d5a8662-config-volume\") pod \"coredns-76f75df574-7pgvz\" (UID: \"c9119358-2d09-4f2c-8607-50e91d5a8662\") " pod="kube-system/coredns-76f75df574-7pgvz" Dec 13 01:49:21.913335 kubelet[2063]: I1213 01:49:21.913257 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2wzw9\" (UniqueName: \"kubernetes.io/projected/0d753e72-b10a-4daf-bc52-048e56a3d5fb-kube-api-access-2wzw9\") pod \"calico-kube-controllers-55f8cd8f6f-4t7m7\" (UID: \"0d753e72-b10a-4daf-bc52-048e56a3d5fb\") " pod="calico-system/calico-kube-controllers-55f8cd8f6f-4t7m7" Dec 13 01:49:21.913335 kubelet[2063]: I1213 01:49:21.913285 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/3a0c5520-4e5d-444e-9889-cfefde6f6729-calico-apiserver-certs\") pod \"calico-apiserver-8fbdb9594-795pg\" (UID: \"3a0c5520-4e5d-444e-9889-cfefde6f6729\") " pod="calico-apiserver/calico-apiserver-8fbdb9594-795pg" Dec 13 01:49:22.112818 kubelet[2063]: E1213 01:49:22.112777 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:22.113386 env[1206]: time="2024-12-13T01:49:22.113349244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2b2ms,Uid:8e7884e0-a465-45d2-be86-19bfdd944b31,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:22.129304 env[1206]: time="2024-12-13T01:49:22.129273762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55f8cd8f6f-4t7m7,Uid:0d753e72-b10a-4daf-bc52-048e56a3d5fb,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:22.129374 env[1206]: time="2024-12-13T01:49:22.129316569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8fbdb9594-795pg,Uid:3a0c5520-4e5d-444e-9889-cfefde6f6729,Namespace:calico-apiserver,Attempt:0,}" Dec 13 01:49:22.135446 kubelet[2063]: E1213 01:49:22.135413 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:22.135720 env[1206]: time="2024-12-13T01:49:22.135695501Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-7pgvz,Uid:c9119358-2d09-4f2c-8607-50e91d5a8662,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:22.140209 env[1206]: time="2024-12-13T01:49:22.140168213Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8fbdb9594-5mmrr,Uid:3a146104-b9e8-40de-887c-c190d7aca84e,Namespace:calico-apiserver,Attempt:0,}" Dec 13 01:49:22.678430 env[1206]: time="2024-12-13T01:49:22.678360160Z" level=error msg="Failed to destroy network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.679086 env[1206]: time="2024-12-13T01:49:22.679061967Z" level=error msg="encountered an error cleaning up failed sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.679230 env[1206]: time="2024-12-13T01:49:22.679202672Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-7pgvz,Uid:c9119358-2d09-4f2c-8607-50e91d5a8662,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.680434 kubelet[2063]: E1213 01:49:22.679539 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.680434 kubelet[2063]: E1213 01:49:22.679606 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-7pgvz" Dec 13 01:49:22.680434 kubelet[2063]: E1213 01:49:22.679628 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-7pgvz" Dec 13 01:49:22.680751 kubelet[2063]: E1213 01:49:22.679681 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-7pgvz_kube-system(c9119358-2d09-4f2c-8607-50e91d5a8662)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-7pgvz_kube-system(c9119358-2d09-4f2c-8607-50e91d5a8662)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-7pgvz" podUID="c9119358-2d09-4f2c-8607-50e91d5a8662" Dec 13 01:49:22.682435 env[1206]: time="2024-12-13T01:49:22.682397624Z" level=error msg="Failed to destroy network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.682810 env[1206]: time="2024-12-13T01:49:22.682776839Z" level=error msg="encountered an error cleaning up failed sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.682927 env[1206]: time="2024-12-13T01:49:22.682898896Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8fbdb9594-795pg,Uid:3a0c5520-4e5d-444e-9889-cfefde6f6729,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.683404 kubelet[2063]: E1213 01:49:22.683186 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.683404 kubelet[2063]: E1213 01:49:22.683221 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8fbdb9594-795pg" Dec 13 01:49:22.683404 kubelet[2063]: E1213 01:49:22.683237 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8fbdb9594-795pg" Dec 13 01:49:22.683510 kubelet[2063]: E1213 01:49:22.683280 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8fbdb9594-795pg_calico-apiserver(3a0c5520-4e5d-444e-9889-cfefde6f6729)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8fbdb9594-795pg_calico-apiserver(3a0c5520-4e5d-444e-9889-cfefde6f6729)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8fbdb9594-795pg" podUID="3a0c5520-4e5d-444e-9889-cfefde6f6729" Dec 13 01:49:22.699937 env[1206]: time="2024-12-13T01:49:22.699878876Z" level=error msg="Failed to destroy network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.700217 env[1206]: time="2024-12-13T01:49:22.700188221Z" level=error msg="encountered an error cleaning up failed sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.700266 env[1206]: time="2024-12-13T01:49:22.700239104Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2b2ms,Uid:8e7884e0-a465-45d2-be86-19bfdd944b31,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.700632 kubelet[2063]: E1213 01:49:22.700450 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.700632 kubelet[2063]: E1213 01:49:22.700512 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-2b2ms" Dec 13 01:49:22.700632 kubelet[2063]: E1213 01:49:22.700544 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-2b2ms" Dec 13 01:49:22.700734 kubelet[2063]: E1213 01:49:22.700606 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-2b2ms_kube-system(8e7884e0-a465-45d2-be86-19bfdd944b31)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-2b2ms_kube-system(8e7884e0-a465-45d2-be86-19bfdd944b31)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-2b2ms" podUID="8e7884e0-a465-45d2-be86-19bfdd944b31" Dec 13 01:49:22.701642 env[1206]: time="2024-12-13T01:49:22.701586405Z" level=error msg="Failed to destroy network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.702002 env[1206]: time="2024-12-13T01:49:22.701968186Z" level=error msg="encountered an error cleaning up failed sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.702053 env[1206]: time="2024-12-13T01:49:22.702021353Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55f8cd8f6f-4t7m7,Uid:0d753e72-b10a-4daf-bc52-048e56a3d5fb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.702180 kubelet[2063]: E1213 01:49:22.702158 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.702245 kubelet[2063]: E1213 01:49:22.702192 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55f8cd8f6f-4t7m7" Dec 13 01:49:22.702245 kubelet[2063]: E1213 01:49:22.702217 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55f8cd8f6f-4t7m7" Dec 13 01:49:22.702302 kubelet[2063]: E1213 01:49:22.702272 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55f8cd8f6f-4t7m7_calico-system(0d753e72-b10a-4daf-bc52-048e56a3d5fb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55f8cd8f6f-4t7m7_calico-system(0d753e72-b10a-4daf-bc52-048e56a3d5fb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55f8cd8f6f-4t7m7" podUID="0d753e72-b10a-4daf-bc52-048e56a3d5fb" Dec 13 01:49:22.705840 env[1206]: time="2024-12-13T01:49:22.705790565Z" level=error msg="Failed to destroy network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.706110 env[1206]: time="2024-12-13T01:49:22.706078847Z" level=error msg="encountered an error cleaning up failed sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.706145 env[1206]: time="2024-12-13T01:49:22.706124470Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8fbdb9594-5mmrr,Uid:3a146104-b9e8-40de-887c-c190d7aca84e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.706339 kubelet[2063]: E1213 01:49:22.706312 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.706508 kubelet[2063]: E1213 01:49:22.706358 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8fbdb9594-5mmrr" Dec 13 01:49:22.706508 kubelet[2063]: E1213 01:49:22.706377 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8fbdb9594-5mmrr" Dec 13 01:49:22.706508 kubelet[2063]: E1213 01:49:22.706425 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8fbdb9594-5mmrr_calico-apiserver(3a146104-b9e8-40de-887c-c190d7aca84e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8fbdb9594-5mmrr_calico-apiserver(3a146104-b9e8-40de-887c-c190d7aca84e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8fbdb9594-5mmrr" podUID="3a146104-b9e8-40de-887c-c190d7aca84e" Dec 13 01:49:22.745310 systemd[1]: Created slice kubepods-besteffort-pod1909b05f_26da_4b80_8a43_155547fbfec0.slice. Dec 13 01:49:22.747209 env[1206]: time="2024-12-13T01:49:22.747175280Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7cxjh,Uid:1909b05f-26da-4b80-8a43-155547fbfec0,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:22.796671 env[1206]: time="2024-12-13T01:49:22.796598247Z" level=error msg="Failed to destroy network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.796945 env[1206]: time="2024-12-13T01:49:22.796909436Z" level=error msg="encountered an error cleaning up failed sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.796998 env[1206]: time="2024-12-13T01:49:22.796954267Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7cxjh,Uid:1909b05f-26da-4b80-8a43-155547fbfec0,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.797201 kubelet[2063]: E1213 01:49:22.797174 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.797285 kubelet[2063]: E1213 01:49:22.797228 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7cxjh" Dec 13 01:49:22.797285 kubelet[2063]: E1213 01:49:22.797253 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7cxjh" Dec 13 01:49:22.797348 kubelet[2063]: E1213 01:49:22.797307 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7cxjh_calico-system(1909b05f-26da-4b80-8a43-155547fbfec0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7cxjh_calico-system(1909b05f-26da-4b80-8a43-155547fbfec0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:22.833852 kubelet[2063]: I1213 01:49:22.833824 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:22.834499 env[1206]: time="2024-12-13T01:49:22.834455199Z" level=info msg="StopPodSandbox for \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\"" Dec 13 01:49:22.835053 kubelet[2063]: I1213 01:49:22.835029 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Dec 13 01:49:22.835501 env[1206]: time="2024-12-13T01:49:22.835462974Z" level=info msg="StopPodSandbox for \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\"" Dec 13 01:49:22.836325 kubelet[2063]: I1213 01:49:22.836303 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Dec 13 01:49:22.836831 env[1206]: time="2024-12-13T01:49:22.836750043Z" level=info msg="StopPodSandbox for \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\"" Dec 13 01:49:22.838885 kubelet[2063]: I1213 01:49:22.838635 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:22.838954 env[1206]: time="2024-12-13T01:49:22.838922901Z" level=info msg="StopPodSandbox for \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\"" Dec 13 01:49:22.840873 kubelet[2063]: I1213 01:49:22.840230 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:22.840927 env[1206]: time="2024-12-13T01:49:22.840760011Z" level=info msg="StopPodSandbox for \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\"" Dec 13 01:49:22.844493 kubelet[2063]: I1213 01:49:22.844435 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Dec 13 01:49:22.846176 env[1206]: time="2024-12-13T01:49:22.846130145Z" level=info msg="StopPodSandbox for \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\"" Dec 13 01:49:22.877277 env[1206]: time="2024-12-13T01:49:22.877216473Z" level=error msg="StopPodSandbox for \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\" failed" error="failed to destroy network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.877707 kubelet[2063]: E1213 01:49:22.877684 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Dec 13 01:49:22.877786 kubelet[2063]: E1213 01:49:22.877761 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31"} Dec 13 01:49:22.877817 kubelet[2063]: E1213 01:49:22.877796 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3a0c5520-4e5d-444e-9889-cfefde6f6729\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:22.877890 kubelet[2063]: E1213 01:49:22.877831 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3a0c5520-4e5d-444e-9889-cfefde6f6729\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8fbdb9594-795pg" podUID="3a0c5520-4e5d-444e-9889-cfefde6f6729" Dec 13 01:49:22.879970 env[1206]: time="2024-12-13T01:49:22.879919011Z" level=error msg="StopPodSandbox for \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\" failed" error="failed to destroy network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.880183 kubelet[2063]: E1213 01:49:22.880158 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:22.880249 kubelet[2063]: E1213 01:49:22.880186 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca"} Dec 13 01:49:22.880249 kubelet[2063]: E1213 01:49:22.880212 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e7884e0-a465-45d2-be86-19bfdd944b31\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:22.880249 kubelet[2063]: E1213 01:49:22.880233 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e7884e0-a465-45d2-be86-19bfdd944b31\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-2b2ms" podUID="8e7884e0-a465-45d2-be86-19bfdd944b31" Dec 13 01:49:22.893690 env[1206]: time="2024-12-13T01:49:22.893620590Z" level=error msg="StopPodSandbox for \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\" failed" error="failed to destroy network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.894016 kubelet[2063]: E1213 01:49:22.893985 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:22.894084 kubelet[2063]: E1213 01:49:22.894039 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa"} Dec 13 01:49:22.894084 kubelet[2063]: E1213 01:49:22.894072 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3a146104-b9e8-40de-887c-c190d7aca84e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:22.894185 kubelet[2063]: E1213 01:49:22.894099 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3a146104-b9e8-40de-887c-c190d7aca84e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8fbdb9594-5mmrr" podUID="3a146104-b9e8-40de-887c-c190d7aca84e" Dec 13 01:49:22.898575 env[1206]: time="2024-12-13T01:49:22.898537429Z" level=error msg="StopPodSandbox for \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\" failed" error="failed to destroy network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.899046 kubelet[2063]: E1213 01:49:22.898923 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Dec 13 01:49:22.899046 kubelet[2063]: E1213 01:49:22.898963 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a"} Dec 13 01:49:22.899046 kubelet[2063]: E1213 01:49:22.898999 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1909b05f-26da-4b80-8a43-155547fbfec0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:22.899046 kubelet[2063]: E1213 01:49:22.899026 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1909b05f-26da-4b80-8a43-155547fbfec0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:22.901041 env[1206]: time="2024-12-13T01:49:22.900981084Z" level=error msg="StopPodSandbox for \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\" failed" error="failed to destroy network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.901497 kubelet[2063]: E1213 01:49:22.901224 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:22.901497 kubelet[2063]: E1213 01:49:22.901265 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9"} Dec 13 01:49:22.901497 kubelet[2063]: E1213 01:49:22.901304 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0d753e72-b10a-4daf-bc52-048e56a3d5fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:22.901497 kubelet[2063]: E1213 01:49:22.901335 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0d753e72-b10a-4daf-bc52-048e56a3d5fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55f8cd8f6f-4t7m7" podUID="0d753e72-b10a-4daf-bc52-048e56a3d5fb" Dec 13 01:49:22.911709 env[1206]: time="2024-12-13T01:49:22.911635361Z" level=error msg="StopPodSandbox for \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\" failed" error="failed to destroy network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.911893 kubelet[2063]: E1213 01:49:22.911873 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Dec 13 01:49:22.911964 kubelet[2063]: E1213 01:49:22.911904 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3"} Dec 13 01:49:22.911964 kubelet[2063]: E1213 01:49:22.911934 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c9119358-2d09-4f2c-8607-50e91d5a8662\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:22.911964 kubelet[2063]: E1213 01:49:22.911956 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c9119358-2d09-4f2c-8607-50e91d5a8662\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-7pgvz" podUID="c9119358-2d09-4f2c-8607-50e91d5a8662" Dec 13 01:49:23.588809 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa-shm.mount: Deactivated successfully. Dec 13 01:49:23.588889 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31-shm.mount: Deactivated successfully. Dec 13 01:49:23.588949 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca-shm.mount: Deactivated successfully. Dec 13 01:49:23.588994 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9-shm.mount: Deactivated successfully. Dec 13 01:49:25.903835 systemd[1]: Started sshd@10-10.0.0.22:22-10.0.0.1:47022.service. Dec 13 01:49:25.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.22:22-10.0.0.1:47022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:25.905354 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 01:49:25.905470 kernel: audit: type=1130 audit(1734054565.903:1035): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.22:22-10.0.0.1:47022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:25.938000 audit[3256]: USER_ACCT pid=3256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:25.938844 sshd[3256]: Accepted publickey for core from 10.0.0.1 port 47022 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:25.943537 kernel: audit: type=1101 audit(1734054565.938:1036): pid=3256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:25.943000 audit[3256]: CRED_ACQ pid=3256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:25.944150 sshd[3256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:25.947850 systemd-logind[1192]: New session 11 of user core. Dec 13 01:49:25.948652 systemd[1]: Started session-11.scope. Dec 13 01:49:25.950839 kernel: audit: type=1103 audit(1734054565.943:1037): pid=3256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:25.950996 kernel: audit: type=1006 audit(1734054565.943:1038): pid=3256 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 01:49:25.951020 kernel: audit: type=1300 audit(1734054565.943:1038): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd70650690 a2=3 a3=0 items=0 ppid=1 pid=3256 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:25.943000 audit[3256]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd70650690 a2=3 a3=0 items=0 ppid=1 pid=3256 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:25.955157 kernel: audit: type=1327 audit(1734054565.943:1038): proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:25.943000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:25.952000 audit[3256]: USER_START pid=3256 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:25.961123 kernel: audit: type=1105 audit(1734054565.952:1039): pid=3256 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:25.961183 kernel: audit: type=1103 audit(1734054565.954:1040): pid=3258 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:25.954000 audit[3258]: CRED_ACQ pid=3258 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:26.083270 sshd[3256]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:26.083000 audit[3256]: USER_END pid=3256 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:26.085812 systemd[1]: sshd@10-10.0.0.22:22-10.0.0.1:47022.service: Deactivated successfully. Dec 13 01:49:26.086537 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 01:49:26.087312 systemd-logind[1192]: Session 11 logged out. Waiting for processes to exit. Dec 13 01:49:26.087979 systemd-logind[1192]: Removed session 11. Dec 13 01:49:26.083000 audit[3256]: CRED_DISP pid=3256 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:26.093818 kernel: audit: type=1106 audit(1734054566.083:1041): pid=3256 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:26.093862 kernel: audit: type=1104 audit(1734054566.083:1042): pid=3256 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:26.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.22:22-10.0.0.1:47022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:31.092662 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:49:31.092836 kernel: audit: type=1130 audit(1734054571.086:1044): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.22:22-10.0.0.1:41828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:31.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.22:22-10.0.0.1:41828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:31.087753 systemd[1]: Started sshd@11-10.0.0.22:22-10.0.0.1:41828.service. Dec 13 01:49:31.116000 audit[3273]: USER_ACCT pid=3273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.118445 sshd[3273]: Accepted publickey for core from 10.0.0.1 port 41828 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:31.120992 sshd[3273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:31.119000 audit[3273]: CRED_ACQ pid=3273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.130663 kernel: audit: type=1101 audit(1734054571.116:1045): pid=3273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.130721 kernel: audit: type=1103 audit(1734054571.119:1046): pid=3273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.130740 kernel: audit: type=1006 audit(1734054571.119:1047): pid=3273 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 01:49:31.130755 kernel: audit: type=1300 audit(1734054571.119:1047): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc861d0080 a2=3 a3=0 items=0 ppid=1 pid=3273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.119000 audit[3273]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc861d0080 a2=3 a3=0 items=0 ppid=1 pid=3273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.125787 systemd-logind[1192]: New session 12 of user core. Dec 13 01:49:31.126597 systemd[1]: Started session-12.scope. Dec 13 01:49:31.119000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:31.133189 kernel: audit: type=1327 audit(1734054571.119:1047): proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:31.133229 kernel: audit: type=1105 audit(1734054571.128:1048): pid=3273 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.128000 audit[3273]: USER_START pid=3273 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.137567 kernel: audit: type=1103 audit(1734054571.130:1049): pid=3275 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.130000 audit[3275]: CRED_ACQ pid=3275 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.262298 sshd[3273]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:31.263000 audit[3273]: USER_END pid=3273 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.265064 systemd[1]: sshd@11-10.0.0.22:22-10.0.0.1:41828.service: Deactivated successfully. Dec 13 01:49:31.268608 kernel: audit: type=1106 audit(1734054571.263:1050): pid=3273 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.265549 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 01:49:31.267640 systemd[1]: Started sshd@12-10.0.0.22:22-10.0.0.1:41840.service. Dec 13 01:49:31.268790 systemd-logind[1192]: Session 12 logged out. Waiting for processes to exit. Dec 13 01:49:31.263000 audit[3273]: CRED_DISP pid=3273 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.22:22-10.0.0.1:41828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:31.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.22:22-10.0.0.1:41840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:31.272834 systemd-logind[1192]: Removed session 12. Dec 13 01:49:31.273560 kernel: audit: type=1104 audit(1734054571.263:1051): pid=3273 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.293000 audit[3287]: USER_ACCT pid=3287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.294534 sshd[3287]: Accepted publickey for core from 10.0.0.1 port 41840 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:31.294000 audit[3287]: CRED_ACQ pid=3287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.294000 audit[3287]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9804da60 a2=3 a3=0 items=0 ppid=1 pid=3287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.294000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:31.295767 sshd[3287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:31.298860 systemd-logind[1192]: New session 13 of user core. Dec 13 01:49:31.299609 systemd[1]: Started session-13.scope. Dec 13 01:49:31.302000 audit[3287]: USER_START pid=3287 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.304000 audit[3289]: CRED_ACQ pid=3289 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.467205 sshd[3287]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:31.468000 audit[3287]: USER_END pid=3287 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.468000 audit[3287]: CRED_DISP pid=3287 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.471149 systemd[1]: Started sshd@13-10.0.0.22:22-10.0.0.1:41856.service. Dec 13 01:49:31.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.22:22-10.0.0.1:41856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:31.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.22:22-10.0.0.1:41840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:31.473164 systemd[1]: sshd@12-10.0.0.22:22-10.0.0.1:41840.service: Deactivated successfully. Dec 13 01:49:31.473753 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 01:49:31.475290 systemd-logind[1192]: Session 13 logged out. Waiting for processes to exit. Dec 13 01:49:31.477947 systemd-logind[1192]: Removed session 13. Dec 13 01:49:31.505000 audit[3297]: USER_ACCT pid=3297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.506170 sshd[3297]: Accepted publickey for core from 10.0.0.1 port 41856 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:31.506000 audit[3297]: CRED_ACQ pid=3297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.506000 audit[3297]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9d9295c0 a2=3 a3=0 items=0 ppid=1 pid=3297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.506000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:31.507055 sshd[3297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:31.511190 systemd-logind[1192]: New session 14 of user core. Dec 13 01:49:31.511458 systemd[1]: Started session-14.scope. Dec 13 01:49:31.514000 audit[3297]: USER_START pid=3297 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.515000 audit[3300]: CRED_ACQ pid=3300 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.637212 sshd[3297]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:31.637000 audit[3297]: USER_END pid=3297 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.637000 audit[3297]: CRED_DISP pid=3297 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:31.639742 systemd[1]: sshd@13-10.0.0.22:22-10.0.0.1:41856.service: Deactivated successfully. Dec 13 01:49:31.640400 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 01:49:31.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.22:22-10.0.0.1:41856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:31.641085 systemd-logind[1192]: Session 14 logged out. Waiting for processes to exit. Dec 13 01:49:31.641878 systemd-logind[1192]: Removed session 14. Dec 13 01:49:32.523007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1600976276.mount: Deactivated successfully. Dec 13 01:49:33.742341 env[1206]: time="2024-12-13T01:49:33.742285113Z" level=info msg="StopPodSandbox for \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\"" Dec 13 01:49:33.948909 env[1206]: time="2024-12-13T01:49:33.948834554Z" level=error msg="StopPodSandbox for \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\" failed" error="failed to destroy network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:33.952770 kubelet[2063]: E1213 01:49:33.949044 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Dec 13 01:49:33.952770 kubelet[2063]: E1213 01:49:33.949082 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31"} Dec 13 01:49:33.952770 kubelet[2063]: E1213 01:49:33.949113 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3a0c5520-4e5d-444e-9889-cfefde6f6729\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:33.952770 kubelet[2063]: E1213 01:49:33.949140 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3a0c5520-4e5d-444e-9889-cfefde6f6729\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8fbdb9594-795pg" podUID="3a0c5520-4e5d-444e-9889-cfefde6f6729" Dec 13 01:49:33.987189 env[1206]: time="2024-12-13T01:49:33.987163670Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:34.014469 env[1206]: time="2024-12-13T01:49:34.014307910Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:34.066131 env[1206]: time="2024-12-13T01:49:34.066068855Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:34.117727 env[1206]: time="2024-12-13T01:49:34.117683959Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:34.117991 env[1206]: time="2024-12-13T01:49:34.117963587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 01:49:34.133110 env[1206]: time="2024-12-13T01:49:34.133059517Z" level=info msg="CreateContainer within sandbox \"d9f3afe2dfb4918f9a0dd060663bf2d8acaa0c99796938da5987d7dadae10e3e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 01:49:34.741299 env[1206]: time="2024-12-13T01:49:34.741257169Z" level=info msg="StopPodSandbox for \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\"" Dec 13 01:49:34.760374 env[1206]: time="2024-12-13T01:49:34.760313840Z" level=error msg="StopPodSandbox for \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\" failed" error="failed to destroy network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:34.760697 kubelet[2063]: E1213 01:49:34.760573 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Dec 13 01:49:34.760697 kubelet[2063]: E1213 01:49:34.760615 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3"} Dec 13 01:49:34.760697 kubelet[2063]: E1213 01:49:34.760650 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c9119358-2d09-4f2c-8607-50e91d5a8662\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:34.760697 kubelet[2063]: E1213 01:49:34.760674 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c9119358-2d09-4f2c-8607-50e91d5a8662\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-7pgvz" podUID="c9119358-2d09-4f2c-8607-50e91d5a8662" Dec 13 01:49:35.051323 env[1206]: time="2024-12-13T01:49:35.051188887Z" level=info msg="CreateContainer within sandbox \"d9f3afe2dfb4918f9a0dd060663bf2d8acaa0c99796938da5987d7dadae10e3e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7e02e3d2b35d0c1887b4917735093b9123c8afd583e1e9f2d948a8ea3ada017e\"" Dec 13 01:49:35.051967 env[1206]: time="2024-12-13T01:49:35.051941452Z" level=info msg="StartContainer for \"7e02e3d2b35d0c1887b4917735093b9123c8afd583e1e9f2d948a8ea3ada017e\"" Dec 13 01:49:35.065108 systemd[1]: Started cri-containerd-7e02e3d2b35d0c1887b4917735093b9123c8afd583e1e9f2d948a8ea3ada017e.scope. Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f0a5c894d38 items=0 ppid=2536 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765303265336432623335643063313838376234393137373335303933 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.076000 audit: BPF prog-id=136 op=LOAD Dec 13 01:49:35.076000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c00038c068 items=0 ppid=2536 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765303265336432623335643063313838376234393137373335303933 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit: BPF prog-id=137 op=LOAD Dec 13 01:49:35.077000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c00038c0b8 items=0 ppid=2536 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765303265336432623335643063313838376234393137373335303933 Dec 13 01:49:35.077000 audit: BPF prog-id=137 op=UNLOAD Dec 13 01:49:35.077000 audit: BPF prog-id=136 op=UNLOAD Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.077000 audit: BPF prog-id=138 op=LOAD Dec 13 01:49:35.077000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c00038c148 items=0 ppid=2536 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765303265336432623335643063313838376234393137373335303933 Dec 13 01:49:35.170270 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 01:49:35.170392 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 01:49:35.204099 env[1206]: time="2024-12-13T01:49:35.204056661Z" level=info msg="StartContainer for \"7e02e3d2b35d0c1887b4917735093b9123c8afd583e1e9f2d948a8ea3ada017e\" returns successfully" Dec 13 01:49:35.742031 env[1206]: time="2024-12-13T01:49:35.741997135Z" level=info msg="StopPodSandbox for \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\"" Dec 13 01:49:35.763509 env[1206]: time="2024-12-13T01:49:35.763446539Z" level=error msg="StopPodSandbox for \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\" failed" error="failed to destroy network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:35.763868 kubelet[2063]: E1213 01:49:35.763715 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Dec 13 01:49:35.763868 kubelet[2063]: E1213 01:49:35.763759 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a"} Dec 13 01:49:35.763868 kubelet[2063]: E1213 01:49:35.763792 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1909b05f-26da-4b80-8a43-155547fbfec0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:35.763868 kubelet[2063]: E1213 01:49:35.763818 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1909b05f-26da-4b80-8a43-155547fbfec0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7cxjh" podUID="1909b05f-26da-4b80-8a43-155547fbfec0" Dec 13 01:49:35.867912 kubelet[2063]: E1213 01:49:35.867830 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:35.883725 kubelet[2063]: I1213 01:49:35.883465 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-wbhns" podStartSLOduration=3.1514442320000002 podStartE2EDuration="32.883418901s" podCreationTimestamp="2024-12-13 01:49:03 +0000 UTC" firstStartedPulling="2024-12-13 01:49:04.386269008 +0000 UTC m=+22.732422878" lastFinishedPulling="2024-12-13 01:49:34.118243667 +0000 UTC m=+52.464397547" observedRunningTime="2024-12-13 01:49:35.882581508 +0000 UTC m=+54.228735388" watchObservedRunningTime="2024-12-13 01:49:35.883418901 +0000 UTC m=+54.229572772" Dec 13 01:49:36.642320 systemd[1]: Started sshd@14-10.0.0.22:22-10.0.0.1:43048.service. Dec 13 01:49:36.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.22:22-10.0.0.1:43048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:36.644106 kernel: kauditd_printk_skb: 66 callbacks suppressed Dec 13 01:49:36.644170 kernel: audit: type=1130 audit(1734054576.640:1077): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.22:22-10.0.0.1:43048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:36.673000 audit[3476]: USER_ACCT pid=3476 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.675566 sshd[3476]: Accepted publickey for core from 10.0.0.1 port 43048 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:36.679572 kernel: audit: type=1101 audit(1734054576.673:1078): pid=3476 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.678000 audit[3476]: CRED_ACQ pid=3476 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.680127 sshd[3476]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:36.683822 systemd-logind[1192]: New session 15 of user core. Dec 13 01:49:36.684604 systemd[1]: Started session-15.scope. Dec 13 01:49:36.686965 kernel: audit: type=1103 audit(1734054576.678:1079): pid=3476 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.687019 kernel: audit: type=1006 audit(1734054576.678:1080): pid=3476 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 01:49:36.687054 kernel: audit: type=1300 audit(1734054576.678:1080): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e1acd20 a2=3 a3=0 items=0 ppid=1 pid=3476 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.678000 audit[3476]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e1acd20 a2=3 a3=0 items=0 ppid=1 pid=3476 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.678000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:36.693036 kernel: audit: type=1327 audit(1734054576.678:1080): proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:36.693081 kernel: audit: type=1105 audit(1734054576.686:1081): pid=3476 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.686000 audit[3476]: USER_START pid=3476 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.697793 kernel: audit: type=1103 audit(1734054576.686:1082): pid=3478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.686000 audit[3478]: CRED_ACQ pid=3478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.742570 env[1206]: time="2024-12-13T01:49:36.741887738Z" level=info msg="StopPodSandbox for \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\"" Dec 13 01:49:36.742570 env[1206]: time="2024-12-13T01:49:36.742205936Z" level=info msg="StopPodSandbox for \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\"" Dec 13 01:49:36.742570 env[1206]: time="2024-12-13T01:49:36.742285574Z" level=info msg="StopPodSandbox for \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\"" Dec 13 01:49:36.834565 sshd[3476]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:36.835000 audit[3476]: USER_END pid=3476 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.835000 audit[3476]: CRED_DISP pid=3476 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.838496 systemd[1]: sshd@14-10.0.0.22:22-10.0.0.1:43048.service: Deactivated successfully. Dec 13 01:49:36.839333 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 01:49:36.840608 systemd-logind[1192]: Session 15 logged out. Waiting for processes to exit. Dec 13 01:49:36.841574 systemd-logind[1192]: Removed session 15. Dec 13 01:49:36.845345 kernel: audit: type=1106 audit(1734054576.835:1083): pid=3476 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.845412 kernel: audit: type=1104 audit(1734054576.835:1084): pid=3476 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:36.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.22:22-10.0.0.1:43048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.799 [INFO][3530] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.799 [INFO][3530] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" iface="eth0" netns="/var/run/netns/cni-c264bb94-9c06-b567-fb2e-31fc19a9819e" Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.800 [INFO][3530] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" iface="eth0" netns="/var/run/netns/cni-c264bb94-9c06-b567-fb2e-31fc19a9819e" Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.800 [INFO][3530] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" iface="eth0" netns="/var/run/netns/cni-c264bb94-9c06-b567-fb2e-31fc19a9819e" Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.800 [INFO][3530] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.800 [INFO][3530] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.855 [INFO][3557] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" HandleID="k8s-pod-network.7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.855 [INFO][3557] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.855 [INFO][3557] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.860 [WARNING][3557] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" HandleID="k8s-pod-network.7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.861 [INFO][3557] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" HandleID="k8s-pod-network.7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.862 [INFO][3557] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:36.866613 env[1206]: 2024-12-13 01:49:36.865 [INFO][3530] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:36.867200 env[1206]: time="2024-12-13T01:49:36.866767117Z" level=info msg="TearDown network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\" successfully" Dec 13 01:49:36.867200 env[1206]: time="2024-12-13T01:49:36.866801225Z" level=info msg="StopPodSandbox for \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\" returns successfully" Dec 13 01:49:36.868996 systemd[1]: run-netns-cni\x2dc264bb94\x2d9c06\x2db567\x2dfb2e\x2d31fc19a9819e.mount: Deactivated successfully. Dec 13 01:49:36.869305 env[1206]: time="2024-12-13T01:49:36.869262219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8fbdb9594-5mmrr,Uid:3a146104-b9e8-40de-887c-c190d7aca84e,Namespace:calico-apiserver,Attempt:1,}" Dec 13 01:49:36.871358 kubelet[2063]: E1213 01:49:36.871337 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.818 [INFO][3540] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.818 [INFO][3540] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" iface="eth0" netns="/var/run/netns/cni-bcf3ebff-2fba-0548-a76f-9eec22e07bea" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.818 [INFO][3540] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" iface="eth0" netns="/var/run/netns/cni-bcf3ebff-2fba-0548-a76f-9eec22e07bea" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.818 [INFO][3540] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" iface="eth0" netns="/var/run/netns/cni-bcf3ebff-2fba-0548-a76f-9eec22e07bea" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.818 [INFO][3540] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.818 [INFO][3540] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.858 [INFO][3563] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" HandleID="k8s-pod-network.c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.859 [INFO][3563] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.862 [INFO][3563] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.876 [WARNING][3563] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" HandleID="k8s-pod-network.c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.876 [INFO][3563] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" HandleID="k8s-pod-network.c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.877 [INFO][3563] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:36.881646 env[1206]: 2024-12-13 01:49:36.879 [INFO][3540] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:36.884433 systemd[1]: run-netns-cni\x2dbcf3ebff\x2d2fba\x2d0548\x2da76f\x2d9eec22e07bea.mount: Deactivated successfully. Dec 13 01:49:36.891139 systemd[1]: run-containerd-runc-k8s.io-7e02e3d2b35d0c1887b4917735093b9123c8afd583e1e9f2d948a8ea3ada017e-runc.AM1Jcj.mount: Deactivated successfully. Dec 13 01:49:36.891652 env[1206]: time="2024-12-13T01:49:36.891616110Z" level=info msg="TearDown network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\" successfully" Dec 13 01:49:36.891652 env[1206]: time="2024-12-13T01:49:36.891650879Z" level=info msg="StopPodSandbox for \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\" returns successfully" Dec 13 01:49:36.893841 env[1206]: time="2024-12-13T01:49:36.893757323Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55f8cd8f6f-4t7m7,Uid:0d753e72-b10a-4daf-bc52-048e56a3d5fb,Namespace:calico-system,Attempt:1,}" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.833 [INFO][3531] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.833 [INFO][3531] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" iface="eth0" netns="/var/run/netns/cni-e0819f54-46ea-82ee-b41b-d782c8cf2d87" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.834 [INFO][3531] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" iface="eth0" netns="/var/run/netns/cni-e0819f54-46ea-82ee-b41b-d782c8cf2d87" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.834 [INFO][3531] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" iface="eth0" netns="/var/run/netns/cni-e0819f54-46ea-82ee-b41b-d782c8cf2d87" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.834 [INFO][3531] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.834 [INFO][3531] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.883 [INFO][3571] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" HandleID="k8s-pod-network.2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.883 [INFO][3571] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.883 [INFO][3571] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.902 [WARNING][3571] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" HandleID="k8s-pod-network.2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.902 [INFO][3571] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" HandleID="k8s-pod-network.2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.903 [INFO][3571] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:36.908881 env[1206]: 2024-12-13 01:49:36.907 [INFO][3531] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:36.909468 env[1206]: time="2024-12-13T01:49:36.909427964Z" level=info msg="TearDown network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\" successfully" Dec 13 01:49:36.909609 env[1206]: time="2024-12-13T01:49:36.909588823Z" level=info msg="StopPodSandbox for \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\" returns successfully" Dec 13 01:49:36.911060 kubelet[2063]: E1213 01:49:36.910006 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:36.911357 env[1206]: time="2024-12-13T01:49:36.911337930Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2b2ms,Uid:8e7884e0-a465-45d2-be86-19bfdd944b31,Namespace:kube-system,Attempt:1,}" Dec 13 01:49:36.934000 audit[3661]: AVC avc: denied { write } for pid=3661 comm="tee" name="fd" dev="proc" ino=25990 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:36.934000 audit[3661]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe57222a2b a2=241 a3=1b6 items=1 ppid=3635 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.934000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 01:49:36.934000 audit: PATH item=0 name="/dev/fd/63" inode=25987 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:36.934000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:36.960000 audit[3709]: AVC avc: denied { write } for pid=3709 comm="tee" name="fd" dev="proc" ino=26027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:36.960000 audit[3709]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd77403a2a a2=241 a3=1b6 items=1 ppid=3645 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.960000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 01:49:36.960000 audit: PATH item=0 name="/dev/fd/63" inode=26024 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:36.960000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:36.978000 audit[3703]: AVC avc: denied { write } for pid=3703 comm="tee" name="fd" dev="proc" ino=25413 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:36.978000 audit[3703]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb8edfa2c a2=241 a3=1b6 items=1 ppid=3637 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.978000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 01:49:36.978000 audit: PATH item=0 name="/dev/fd/63" inode=26715 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:36.978000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:36.978000 audit[3712]: AVC avc: denied { write } for pid=3712 comm="tee" name="fd" dev="proc" ino=27711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:36.978000 audit[3712]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe539faa1b a2=241 a3=1b6 items=1 ppid=3648 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.978000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 01:49:36.978000 audit: PATH item=0 name="/dev/fd/63" inode=26029 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:36.978000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:36.994000 audit[3741]: AVC avc: denied { write } for pid=3741 comm="tee" name="fd" dev="proc" ino=25421 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:36.994000 audit[3741]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc73634a1a a2=241 a3=1b6 items=1 ppid=3694 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.994000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 01:49:36.994000 audit: PATH item=0 name="/dev/fd/63" inode=27715 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:36.994000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.005000 audit[3748]: AVC avc: denied { write } for pid=3748 comm="tee" name="fd" dev="proc" ino=27719 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:37.005000 audit[3748]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1487ea2a a2=241 a3=1b6 items=1 ppid=3696 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.005000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 01:49:37.005000 audit: PATH item=0 name="/dev/fd/63" inode=26040 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:37.005000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.008000 audit[3725]: AVC avc: denied { write } for pid=3725 comm="tee" name="fd" dev="proc" ino=26736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:37.008000 audit[3725]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0b3d4a2a a2=241 a3=1b6 items=1 ppid=3649 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.008000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 01:49:37.008000 audit: PATH item=0 name="/dev/fd/63" inode=26729 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:37.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:37.068617 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali658f7afff7a: link becomes ready Dec 13 01:49:37.069129 systemd-networkd[1028]: cali658f7afff7a: Link UP Dec 13 01:49:37.069287 systemd-networkd[1028]: cali658f7afff7a: Gained carrier Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:36.915 [INFO][3597] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:36.927 [INFO][3597] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0 calico-apiserver-8fbdb9594- calico-apiserver 3a146104-b9e8-40de-887c-c190d7aca84e 908 0 2024-12-13 01:49:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8fbdb9594 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-8fbdb9594-5mmrr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali658f7afff7a [] []}} ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-5mmrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:36.927 [INFO][3597] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-5mmrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.001 [INFO][3676] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" HandleID="k8s-pod-network.26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.008 [INFO][3676] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" HandleID="k8s-pod-network.26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f4ea0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-8fbdb9594-5mmrr", "timestamp":"2024-12-13 01:49:37.001011176 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.008 [INFO][3676] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.008 [INFO][3676] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.008 [INFO][3676] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.010 [INFO][3676] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" host="localhost" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.019 [INFO][3676] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.033 [INFO][3676] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.037 [INFO][3676] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.040 [INFO][3676] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.040 [INFO][3676] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" host="localhost" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.043 [INFO][3676] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.050 [INFO][3676] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" host="localhost" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.055 [INFO][3676] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" host="localhost" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.055 [INFO][3676] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" host="localhost" Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.055 [INFO][3676] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:37.083178 env[1206]: 2024-12-13 01:49:37.055 [INFO][3676] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" HandleID="k8s-pod-network.26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:37.084288 env[1206]: 2024-12-13 01:49:37.057 [INFO][3597] cni-plugin/k8s.go 386: Populated endpoint ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-5mmrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0", GenerateName:"calico-apiserver-8fbdb9594-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a146104-b9e8-40de-887c-c190d7aca84e", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8fbdb9594", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-8fbdb9594-5mmrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali658f7afff7a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:37.084288 env[1206]: 2024-12-13 01:49:37.057 [INFO][3597] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-5mmrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:37.084288 env[1206]: 2024-12-13 01:49:37.057 [INFO][3597] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali658f7afff7a ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-5mmrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:37.084288 env[1206]: 2024-12-13 01:49:37.068 [INFO][3597] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-5mmrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:37.084288 env[1206]: 2024-12-13 01:49:37.068 [INFO][3597] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-5mmrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0", GenerateName:"calico-apiserver-8fbdb9594-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a146104-b9e8-40de-887c-c190d7aca84e", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8fbdb9594", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e", Pod:"calico-apiserver-8fbdb9594-5mmrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali658f7afff7a", MAC:"d6:36:53:f6:4c:51", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:37.084288 env[1206]: 2024-12-13 01:49:37.081 [INFO][3597] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-5mmrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:37.112805 systemd-networkd[1028]: cali65756532698: Link UP Dec 13 01:49:37.113125 env[1206]: time="2024-12-13T01:49:37.113004774Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:37.113125 env[1206]: time="2024-12-13T01:49:37.113099383Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:37.113217 env[1206]: time="2024-12-13T01:49:37.113122084Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:37.113310 env[1206]: time="2024-12-13T01:49:37.113261173Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e pid=3782 runtime=io.containerd.runc.v2 Dec 13 01:49:37.114927 systemd-networkd[1028]: cali65756532698: Gained carrier Dec 13 01:49:37.115544 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali65756532698: link becomes ready Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:36.956 [INFO][3617] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:36.966 [INFO][3617] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0 calico-kube-controllers-55f8cd8f6f- calico-system 0d753e72-b10a-4daf-bc52-048e56a3d5fb 909 0 2024-12-13 01:49:04 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55f8cd8f6f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-55f8cd8f6f-4t7m7 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali65756532698 [] []}} ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Namespace="calico-system" Pod="calico-kube-controllers-55f8cd8f6f-4t7m7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:36.966 [INFO][3617] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Namespace="calico-system" Pod="calico-kube-controllers-55f8cd8f6f-4t7m7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.047 [INFO][3721] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" HandleID="k8s-pod-network.fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.058 [INFO][3721] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" HandleID="k8s-pod-network.fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002955d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-55f8cd8f6f-4t7m7", "timestamp":"2024-12-13 01:49:37.047609256 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.058 [INFO][3721] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.058 [INFO][3721] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.058 [INFO][3721] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.062 [INFO][3721] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" host="localhost" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.085 [INFO][3721] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.090 [INFO][3721] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.093 [INFO][3721] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.095 [INFO][3721] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.095 [INFO][3721] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" host="localhost" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.096 [INFO][3721] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.100 [INFO][3721] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" host="localhost" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.107 [INFO][3721] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" host="localhost" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.107 [INFO][3721] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" host="localhost" Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.107 [INFO][3721] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:37.128672 env[1206]: 2024-12-13 01:49:37.107 [INFO][3721] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" HandleID="k8s-pod-network.fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:37.129618 env[1206]: 2024-12-13 01:49:37.110 [INFO][3617] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Namespace="calico-system" Pod="calico-kube-controllers-55f8cd8f6f-4t7m7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0", GenerateName:"calico-kube-controllers-55f8cd8f6f-", Namespace:"calico-system", SelfLink:"", UID:"0d753e72-b10a-4daf-bc52-048e56a3d5fb", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55f8cd8f6f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-55f8cd8f6f-4t7m7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali65756532698", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:37.129618 env[1206]: 2024-12-13 01:49:37.110 [INFO][3617] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Namespace="calico-system" Pod="calico-kube-controllers-55f8cd8f6f-4t7m7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:37.129618 env[1206]: 2024-12-13 01:49:37.110 [INFO][3617] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali65756532698 ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Namespace="calico-system" Pod="calico-kube-controllers-55f8cd8f6f-4t7m7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:37.129618 env[1206]: 2024-12-13 01:49:37.115 [INFO][3617] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Namespace="calico-system" Pod="calico-kube-controllers-55f8cd8f6f-4t7m7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:37.129618 env[1206]: 2024-12-13 01:49:37.115 [INFO][3617] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Namespace="calico-system" Pod="calico-kube-controllers-55f8cd8f6f-4t7m7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0", GenerateName:"calico-kube-controllers-55f8cd8f6f-", Namespace:"calico-system", SelfLink:"", UID:"0d753e72-b10a-4daf-bc52-048e56a3d5fb", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55f8cd8f6f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf", Pod:"calico-kube-controllers-55f8cd8f6f-4t7m7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali65756532698", MAC:"1e:db:ed:71:01:87", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:37.129618 env[1206]: 2024-12-13 01:49:37.125 [INFO][3617] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf" Namespace="calico-system" Pod="calico-kube-controllers-55f8cd8f6f-4t7m7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:37.137611 systemd[1]: Started cri-containerd-26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e.scope. Dec 13 01:49:37.155797 systemd-networkd[1028]: cali93916222d84: Link UP Dec 13 01:49:37.160009 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali93916222d84: link becomes ready Dec 13 01:49:37.159729 systemd-networkd[1028]: cali93916222d84: Gained carrier Dec 13 01:49:37.162391 env[1206]: time="2024-12-13T01:49:37.162335804Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:37.162550 env[1206]: time="2024-12-13T01:49:37.162372529Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:37.162550 env[1206]: time="2024-12-13T01:49:37.162382628Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:37.162668 env[1206]: time="2024-12-13T01:49:37.162589989Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf pid=3832 runtime=io.containerd.runc.v2 Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:36.974 [INFO][3667] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:36.985 [INFO][3667] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--2b2ms-eth0 coredns-76f75df574- kube-system 8e7884e0-a465-45d2-be86-19bfdd944b31 910 0 2024-12-13 01:48:58 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-2b2ms eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali93916222d84 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Namespace="kube-system" Pod="coredns-76f75df574-2b2ms" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2b2ms-" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:36.985 [INFO][3667] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Namespace="kube-system" Pod="coredns-76f75df574-2b2ms" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.047 [INFO][3737] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" HandleID="k8s-pod-network.cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.069 [INFO][3737] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" HandleID="k8s-pod-network.cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050990), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-2b2ms", "timestamp":"2024-12-13 01:49:37.047412243 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.069 [INFO][3737] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.108 [INFO][3737] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.108 [INFO][3737] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.111 [INFO][3737] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" host="localhost" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.114 [INFO][3737] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.119 [INFO][3737] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.124 [INFO][3737] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.126 [INFO][3737] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.126 [INFO][3737] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" host="localhost" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.127 [INFO][3737] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99 Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.131 [INFO][3737] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" host="localhost" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.138 [INFO][3737] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" host="localhost" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.138 [INFO][3737] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" host="localhost" Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.138 [INFO][3737] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:37.168315 env[1206]: 2024-12-13 01:49:37.138 [INFO][3737] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" HandleID="k8s-pod-network.cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:37.169114 env[1206]: 2024-12-13 01:49:37.152 [INFO][3667] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Namespace="kube-system" Pod="coredns-76f75df574-2b2ms" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2b2ms-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--2b2ms-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8e7884e0-a465-45d2-be86-19bfdd944b31", ResourceVersion:"910", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-2b2ms", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali93916222d84", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:37.169114 env[1206]: 2024-12-13 01:49:37.152 [INFO][3667] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Namespace="kube-system" Pod="coredns-76f75df574-2b2ms" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:37.169114 env[1206]: 2024-12-13 01:49:37.153 [INFO][3667] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali93916222d84 ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Namespace="kube-system" Pod="coredns-76f75df574-2b2ms" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:37.169114 env[1206]: 2024-12-13 01:49:37.156 [INFO][3667] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Namespace="kube-system" Pod="coredns-76f75df574-2b2ms" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:37.169114 env[1206]: 2024-12-13 01:49:37.156 [INFO][3667] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Namespace="kube-system" Pod="coredns-76f75df574-2b2ms" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2b2ms-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--2b2ms-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8e7884e0-a465-45d2-be86-19bfdd944b31", ResourceVersion:"910", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99", Pod:"coredns-76f75df574-2b2ms", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali93916222d84", MAC:"16:f3:3a:95:7f:d1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:37.169114 env[1206]: 2024-12-13 01:49:37.164 [INFO][3667] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99" Namespace="kube-system" Pod="coredns-76f75df574-2b2ms" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.168000 audit: BPF prog-id=139 op=LOAD Dec 13 01:49:37.169000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.169000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3782 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236616531346635343566623236376264373133323035653431363133 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3782 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236616531346635343566623236376264373133323035653431363133 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.170000 audit: BPF prog-id=140 op=LOAD Dec 13 01:49:37.170000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000092fb0 items=0 ppid=3782 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236616531346635343566623236376264373133323035653431363133 Dec 13 01:49:37.171000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.171000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.171000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.171000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.171000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.171000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.171000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.171000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.171000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.171000 audit: BPF prog-id=141 op=LOAD Dec 13 01:49:37.171000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000092ff8 items=0 ppid=3782 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236616531346635343566623236376264373133323035653431363133 Dec 13 01:49:37.173000 audit: BPF prog-id=141 op=UNLOAD Dec 13 01:49:37.173000 audit: BPF prog-id=140 op=UNLOAD Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.174000 audit: BPF prog-id=142 op=LOAD Dec 13 01:49:37.174000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000093408 items=0 ppid=3782 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236616531346635343566623236376264373133323035653431363133 Dec 13 01:49:37.178471 systemd[1]: Started cri-containerd-fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf.scope. Dec 13 01:49:37.180695 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:49:37.188000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.188000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.188000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.188000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.188000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.188000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.188000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.188000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.188000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.188000 audit: BPF prog-id=143 op=LOAD Dec 13 01:49:37.188000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfabd68e0 a2=98 a3=3 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.189000 audit: BPF prog-id=143 op=UNLOAD Dec 13 01:49:37.189000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.189000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.189000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.189000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.189000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.189000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.189000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.189000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.189000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.189000 audit: BPF prog-id=144 op=LOAD Dec 13 01:49:37.189000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfabd66c0 a2=74 a3=540051 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.189000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.191000 audit: BPF prog-id=144 op=UNLOAD Dec 13 01:49:37.191000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit: BPF prog-id=145 op=LOAD Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.191000 audit: BPF prog-id=146 op=LOAD Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3832 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396530623966386163313836616436653263333436313334316366 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3832 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396530623966386163313836616436653263333436313334316366 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit: BPF prog-id=147 op=LOAD Dec 13 01:49:37.192000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f40b0 items=0 ppid=3832 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396530623966386163313836616436653263333436313334316366 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit: BPF prog-id=148 op=LOAD Dec 13 01:49:37.192000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f40f8 items=0 ppid=3832 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396530623966386163313836616436653263333436313334316366 Dec 13 01:49:37.192000 audit: BPF prog-id=148 op=UNLOAD Dec 13 01:49:37.192000 audit: BPF prog-id=147 op=UNLOAD Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.192000 audit: BPF prog-id=149 op=LOAD Dec 13 01:49:37.192000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f4508 items=0 ppid=3832 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663396530623966386163313836616436653263333436313334316366 Dec 13 01:49:37.196171 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:49:37.196618 env[1206]: time="2024-12-13T01:49:37.196154114Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:37.196618 env[1206]: time="2024-12-13T01:49:37.196204144Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:37.196618 env[1206]: time="2024-12-13T01:49:37.196214342Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:37.196618 env[1206]: time="2024-12-13T01:49:37.196335910Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99 pid=3887 runtime=io.containerd.runc.v2 Dec 13 01:49:37.191000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfabd66f0 a2=94 a3=2 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.191000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.197000 audit: BPF prog-id=145 op=UNLOAD Dec 13 01:49:37.213312 systemd[1]: Started cri-containerd-cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99.scope. Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.226000 audit: BPF prog-id=150 op=LOAD Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3887 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362633934333866363732623465633263656262653736373564646464 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3887 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362633934333866363732623465633263656262653736373564646464 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit: BPF prog-id=151 op=LOAD Dec 13 01:49:37.227000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000359100 items=0 ppid=3887 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362633934333866363732623465633263656262653736373564646464 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit: BPF prog-id=152 op=LOAD Dec 13 01:49:37.227000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000359148 items=0 ppid=3887 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362633934333866363732623465633263656262653736373564646464 Dec 13 01:49:37.227000 audit: BPF prog-id=152 op=UNLOAD Dec 13 01:49:37.227000 audit: BPF prog-id=151 op=UNLOAD Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.227000 audit: BPF prog-id=153 op=LOAD Dec 13 01:49:37.227000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000359558 items=0 ppid=3887 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362633934333866363732623465633263656262653736373564646464 Dec 13 01:49:37.229774 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:49:37.236504 env[1206]: time="2024-12-13T01:49:37.236450126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8fbdb9594-5mmrr,Uid:3a146104-b9e8-40de-887c-c190d7aca84e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e\"" Dec 13 01:49:37.237763 env[1206]: time="2024-12-13T01:49:37.237616774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55f8cd8f6f-4t7m7,Uid:0d753e72-b10a-4daf-bc52-048e56a3d5fb,Namespace:calico-system,Attempt:1,} returns sandbox id \"fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf\"" Dec 13 01:49:37.242184 env[1206]: time="2024-12-13T01:49:37.242143531Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 01:49:37.259435 env[1206]: time="2024-12-13T01:49:37.259384495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2b2ms,Uid:8e7884e0-a465-45d2-be86-19bfdd944b31,Namespace:kube-system,Attempt:1,} returns sandbox id \"cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99\"" Dec 13 01:49:37.260417 kubelet[2063]: E1213 01:49:37.260246 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:37.261954 env[1206]: time="2024-12-13T01:49:37.261924333Z" level=info msg="CreateContainer within sandbox \"cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 01:49:37.283364 env[1206]: time="2024-12-13T01:49:37.283312725Z" level=info msg="CreateContainer within sandbox \"cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"42752b983bd2cd0f2b5d883c085b9be1d52831a932972a1c589088c786ef84d7\"" Dec 13 01:49:37.284058 env[1206]: time="2024-12-13T01:49:37.284022066Z" level=info msg="StartContainer for \"42752b983bd2cd0f2b5d883c085b9be1d52831a932972a1c589088c786ef84d7\"" Dec 13 01:49:37.299140 systemd[1]: Started cri-containerd-42752b983bd2cd0f2b5d883c085b9be1d52831a932972a1c589088c786ef84d7.scope. Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit: BPF prog-id=154 op=LOAD Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3887 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432373532623938336264326364306632623564383833633038356239 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3887 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432373532623938336264326364306632623564383833633038356239 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit: BPF prog-id=155 op=LOAD Dec 13 01:49:37.317000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028b450 items=0 ppid=3887 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432373532623938336264326364306632623564383833633038356239 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.317000 audit: BPF prog-id=156 op=LOAD Dec 13 01:49:37.317000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028b498 items=0 ppid=3887 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432373532623938336264326364306632623564383833633038356239 Dec 13 01:49:37.318000 audit: BPF prog-id=156 op=UNLOAD Dec 13 01:49:37.318000 audit: BPF prog-id=155 op=UNLOAD Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.318000 audit: BPF prog-id=157 op=LOAD Dec 13 01:49:37.318000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b8a8 items=0 ppid=3887 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432373532623938336264326364306632623564383833633038356239 Dec 13 01:49:37.343662 env[1206]: time="2024-12-13T01:49:37.340855289Z" level=info msg="StartContainer for \"42752b983bd2cd0f2b5d883c085b9be1d52831a932972a1c589088c786ef84d7\" returns successfully" Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit: BPF prog-id=158 op=LOAD Dec 13 01:49:37.349000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfabd65b0 a2=40 a3=1 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.349000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.349000 audit: BPF prog-id=158 op=UNLOAD Dec 13 01:49:37.349000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.349000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdfabd6680 a2=50 a3=7ffdfabd6760 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.349000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.356000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.356000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfabd65c0 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.356000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.356000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.356000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfabd65f0 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.356000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.356000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.356000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfabd6500 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.356000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.356000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.356000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfabd6610 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.356000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.356000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.356000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfabd65f0 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.356000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfabd65e0 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfabd6610 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfabd65f0 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfabd6610 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfabd65e0 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfabd6650 a2=28 a3=0 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdfabd6400 a2=50 a3=1 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit: BPF prog-id=159 op=LOAD Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdfabd6400 a2=94 a3=5 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit: BPF prog-id=159 op=UNLOAD Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdfabd64b0 a2=50 a3=1 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdfabd65d0 a2=4 a3=38 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.357000 audit[3885]: AVC avc: denied { confidentiality } for pid=3885 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.357000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfabd6620 a2=94 a3=6 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { confidentiality } for pid=3885 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.358000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfabd5dd0 a2=94 a3=83 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.358000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.358000 audit[3885]: AVC avc: denied { confidentiality } for pid=3885 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.358000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfabd5dd0 a2=94 a3=83 items=0 ppid=3652 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.358000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit: BPF prog-id=160 op=LOAD Dec 13 01:49:37.365000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf4111280 a2=98 a3=1999999999999999 items=0 ppid=3652 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.365000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:37.365000 audit: BPF prog-id=160 op=UNLOAD Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit: BPF prog-id=161 op=LOAD Dec 13 01:49:37.365000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf4111160 a2=74 a3=ffff items=0 ppid=3652 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.365000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:37.365000 audit: BPF prog-id=161 op=UNLOAD Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.365000 audit: BPF prog-id=162 op=LOAD Dec 13 01:49:37.365000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf41111a0 a2=40 a3=7ffcf4111380 items=0 ppid=3652 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.365000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:37.365000 audit: BPF prog-id=162 op=UNLOAD Dec 13 01:49:37.415776 systemd-networkd[1028]: vxlan.calico: Link UP Dec 13 01:49:37.415784 systemd-networkd[1028]: vxlan.calico: Gained carrier Dec 13 01:49:37.439000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.439000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.439000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.439000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.439000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.439000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.439000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.439000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.439000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.439000 audit: BPF prog-id=163 op=LOAD Dec 13 01:49:37.439000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7b9bf4f0 a2=98 a3=ffffffff items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.439000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.440000 audit: BPF prog-id=163 op=UNLOAD Dec 13 01:49:37.440000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.440000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.440000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.440000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.440000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.440000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.440000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.440000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.440000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.440000 audit: BPF prog-id=164 op=LOAD Dec 13 01:49:37.440000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7b9bf300 a2=74 a3=540051 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.440000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.441000 audit: BPF prog-id=164 op=UNLOAD Dec 13 01:49:37.441000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.441000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.441000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.441000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.441000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.441000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.441000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.441000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.441000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.441000 audit: BPF prog-id=165 op=LOAD Dec 13 01:49:37.441000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7b9bf330 a2=94 a3=2 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.441000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.442000 audit: BPF prog-id=165 op=UNLOAD Dec 13 01:49:37.442000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.442000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7b9bf200 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.443000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.443000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b9bf230 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.445000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.445000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b9bf140 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.445000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.446000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.446000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7b9bf250 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.446000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.446000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7b9bf230 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.446000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.446000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7b9bf220 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.447000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.447000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7b9bf250 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.447000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.447000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b9bf230 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.447000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.447000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b9bf250 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7b9bf220 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.448000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7b9bf290 a2=28 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.448000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.448000 audit: BPF prog-id=166 op=LOAD Dec 13 01:49:37.448000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7b9bf100 a2=40 a3=0 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.448000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.449000 audit: BPF prog-id=166 op=UNLOAD Dec 13 01:49:37.450000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.450000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff7b9bf0f0 a2=50 a3=2800 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.450000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff7b9bf0f0 a2=50 a3=2800 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.451000 audit: BPF prog-id=167 op=LOAD Dec 13 01:49:37.451000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7b9be910 a2=94 a3=2 items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.452000 audit: BPF prog-id=167 op=UNLOAD Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.452000 audit: BPF prog-id=168 op=LOAD Dec 13 01:49:37.452000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7b9bea10 a2=94 a3=2d items=0 ppid=3652 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.452000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit: BPF prog-id=169 op=LOAD Dec 13 01:49:37.456000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6bb353d0 a2=98 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.456000 audit: BPF prog-id=169 op=UNLOAD Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit: BPF prog-id=170 op=LOAD Dec 13 01:49:37.456000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6bb351b0 a2=74 a3=540051 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.456000 audit: BPF prog-id=170 op=UNLOAD Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.456000 audit: BPF prog-id=171 op=LOAD Dec 13 01:49:37.456000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6bb351e0 a2=94 a3=2 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.456000 audit: BPF prog-id=171 op=UNLOAD Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit: BPF prog-id=172 op=LOAD Dec 13 01:49:37.600000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6bb350a0 a2=40 a3=1 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.600000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.600000 audit: BPF prog-id=172 op=UNLOAD Dec 13 01:49:37.600000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.600000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff6bb35170 a2=50 a3=7fff6bb35250 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.600000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6bb350b0 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6bb350e0 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6bb34ff0 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6bb35100 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6bb350e0 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6bb350d0 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6bb35100 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6bb350e0 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6bb35100 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6bb350d0 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6bb35140 a2=28 a3=0 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6bb34ef0 a2=50 a3=1 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit: BPF prog-id=173 op=LOAD Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6bb34ef0 a2=94 a3=5 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit: BPF prog-id=173 op=UNLOAD Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6bb34fa0 a2=50 a3=1 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff6bb350c0 a2=4 a3=38 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4029]: AVC avc: denied { confidentiality } for pid=4029 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.610000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6bb35110 a2=94 a3=6 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { confidentiality } for pid=4029 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.611000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6bb348c0 a2=94 a3=83 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { confidentiality } for pid=4029 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:37.611000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6bb348c0 a2=94 a3=83 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.611000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.611000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6bb36300 a2=10 a3=208 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.612000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6bb361a0 a2=10 a3=3 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.612000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.612000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6bb36140 a2=10 a3=3 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.612000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.612000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6bb36140 a2=10 a3=7 items=0 ppid=3652 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.612000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:37.620000 audit: BPF prog-id=168 op=UNLOAD Dec 13 01:49:37.664000 audit[4055]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:37.664000 audit[4055]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdbde48fb0 a2=0 a3=7ffdbde48f9c items=0 ppid=3652 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.664000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:37.669000 audit[4054]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4054 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:37.669000 audit[4054]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd848f7d60 a2=0 a3=7ffd848f7d4c items=0 ppid=3652 pid=4054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.669000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:37.674000 audit[4058]: NETFILTER_CFG table=filter:99 family=2 entries=141 op=nft_register_chain pid=4058 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:37.674000 audit[4058]: SYSCALL arch=c000003e syscall=46 success=yes exit=78472 a0=3 a1=7ffc92b12600 a2=0 a3=7ffc92b125ec items=0 ppid=3652 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.674000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:37.676000 audit[4053]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4053 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:37.676000 audit[4053]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff48d2cad0 a2=0 a3=7fff48d2cabc items=0 ppid=3652 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.676000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:37.874009 systemd[1]: run-netns-cni\x2de0819f54\x2d46ea\x2d82ee\x2db41b\x2dd782c8cf2d87.mount: Deactivated successfully. Dec 13 01:49:37.879206 kubelet[2063]: E1213 01:49:37.879156 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:37.886759 kubelet[2063]: I1213 01:49:37.886727 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-2b2ms" podStartSLOduration=39.886692354 podStartE2EDuration="39.886692354s" podCreationTimestamp="2024-12-13 01:48:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:37.886607382 +0000 UTC m=+56.232761252" watchObservedRunningTime="2024-12-13 01:49:37.886692354 +0000 UTC m=+56.232846224" Dec 13 01:49:37.910000 audit[4063]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=4063 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.910000 audit[4063]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd7c9b1b10 a2=0 a3=7ffd7c9b1afc items=0 ppid=2224 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:37.919000 audit[4063]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4063 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.919000 audit[4063]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd7c9b1b10 a2=0 a3=0 items=0 ppid=2224 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:37.930000 audit[4065]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=4065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.930000 audit[4065]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffeda84c360 a2=0 a3=7ffeda84c34c items=0 ppid=2224 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:37.937000 audit[4065]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=4065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.937000 audit[4065]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffeda84c360 a2=0 a3=7ffeda84c34c items=0 ppid=2224 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:38.057000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:38.057000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:38.057000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b451a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:49:38.057000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef34c0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:49:38.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:38.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:38.463000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:38.463000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:38.463000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00d9bb8f0 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:49:38.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:49:38.463000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00eb84c90 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:49:38.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:49:38.463000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:38.463000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00e60ad20 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:49:38.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:49:38.467000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:38.467000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00e61d760 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:49:38.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:49:38.483000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:38.483000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00dccebd0 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:49:38.483000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:49:38.484000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:38.484000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00f1cd680 a2=fc6 a3=0 items=0 ppid=1761 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c158 key=(null) Dec 13 01:49:38.484000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 01:49:38.497665 systemd-networkd[1028]: cali65756532698: Gained IPv6LL Dec 13 01:49:38.753668 systemd-networkd[1028]: vxlan.calico: Gained IPv6LL Dec 13 01:49:38.880614 kubelet[2063]: E1213 01:49:38.880570 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:38.882943 systemd-networkd[1028]: cali93916222d84: Gained IPv6LL Dec 13 01:49:38.945664 systemd-networkd[1028]: cali658f7afff7a: Gained IPv6LL Dec 13 01:49:39.881947 kubelet[2063]: E1213 01:49:39.881915 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:40.096662 env[1206]: time="2024-12-13T01:49:40.096599321Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:40.098373 env[1206]: time="2024-12-13T01:49:40.098315111Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:40.100124 env[1206]: time="2024-12-13T01:49:40.100065482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:40.101489 env[1206]: time="2024-12-13T01:49:40.101434836Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:40.101938 env[1206]: time="2024-12-13T01:49:40.101897982Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 01:49:40.102472 env[1206]: time="2024-12-13T01:49:40.102445220Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 01:49:40.103746 env[1206]: time="2024-12-13T01:49:40.103713631Z" level=info msg="CreateContainer within sandbox \"26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 01:49:40.116355 env[1206]: time="2024-12-13T01:49:40.116300788Z" level=info msg="CreateContainer within sandbox \"26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c2fac93db868e48a6c542173dcddb5203c8ba4e69ed3b9007f22047d074772eb\"" Dec 13 01:49:40.116757 env[1206]: time="2024-12-13T01:49:40.116722410Z" level=info msg="StartContainer for \"c2fac93db868e48a6c542173dcddb5203c8ba4e69ed3b9007f22047d074772eb\"" Dec 13 01:49:40.136362 systemd[1]: Started cri-containerd-c2fac93db868e48a6c542173dcddb5203c8ba4e69ed3b9007f22047d074772eb.scope. Dec 13 01:49:40.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit: BPF prog-id=174 op=LOAD Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3782 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666163393364623836386534386136633534323137336463646462 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3782 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666163393364623836386534386136633534323137336463646462 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit: BPF prog-id=175 op=LOAD Dec 13 01:49:40.149000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323960 items=0 ppid=3782 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666163393364623836386534386136633534323137336463646462 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit: BPF prog-id=176 op=LOAD Dec 13 01:49:40.149000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003239a8 items=0 ppid=3782 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666163393364623836386534386136633534323137336463646462 Dec 13 01:49:40.149000 audit: BPF prog-id=176 op=UNLOAD Dec 13 01:49:40.149000 audit: BPF prog-id=175 op=UNLOAD Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { perfmon } for pid=4078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit[4078]: AVC avc: denied { bpf } for pid=4078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.149000 audit: BPF prog-id=177 op=LOAD Dec 13 01:49:40.149000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323db8 items=0 ppid=3782 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666163393364623836386534386136633534323137336463646462 Dec 13 01:49:40.173371 env[1206]: time="2024-12-13T01:49:40.173334117Z" level=info msg="StartContainer for \"c2fac93db868e48a6c542173dcddb5203c8ba4e69ed3b9007f22047d074772eb\" returns successfully" Dec 13 01:49:40.976335 kubelet[2063]: I1213 01:49:40.976000 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8fbdb9594-5mmrr" podStartSLOduration=35.115291434 podStartE2EDuration="37.975960389s" podCreationTimestamp="2024-12-13 01:49:03 +0000 UTC" firstStartedPulling="2024-12-13 01:49:37.24155167 +0000 UTC m=+55.587705540" lastFinishedPulling="2024-12-13 01:49:40.102220625 +0000 UTC m=+58.448374495" observedRunningTime="2024-12-13 01:49:40.975911129 +0000 UTC m=+59.322064999" watchObservedRunningTime="2024-12-13 01:49:40.975960389 +0000 UTC m=+59.322114249" Dec 13 01:49:41.036000 audit[4110]: NETFILTER_CFG table=filter:105 family=2 entries=10 op=nft_register_rule pid=4110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:41.036000 audit[4110]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff3e2445b0 a2=0 a3=7fff3e24459c items=0 ppid=2224 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:41.041000 audit[4110]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=4110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:41.041000 audit[4110]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff3e2445b0 a2=0 a3=7fff3e24459c items=0 ppid=2224 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:41.113532 systemd[1]: run-containerd-runc-k8s.io-c2fac93db868e48a6c542173dcddb5203c8ba4e69ed3b9007f22047d074772eb-runc.LThNaO.mount: Deactivated successfully. Dec 13 01:49:41.472000 audit[4088]: AVC avc: denied { watch } for pid=4088 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_22.2857867092/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c661 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c661 tclass=file permissive=0 Dec 13 01:49:41.472000 audit[4088]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cd5640 a2=fc6 a3=0 items=0 ppid=3782 pid=4088 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c661 key=(null) Dec 13 01:49:41.472000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:49:41.730405 env[1206]: time="2024-12-13T01:49:41.730290047Z" level=info msg="StopPodSandbox for \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\"" Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.777 [WARNING][4127] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0", GenerateName:"calico-kube-controllers-55f8cd8f6f-", Namespace:"calico-system", SelfLink:"", UID:"0d753e72-b10a-4daf-bc52-048e56a3d5fb", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55f8cd8f6f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf", Pod:"calico-kube-controllers-55f8cd8f6f-4t7m7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali65756532698", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.777 [INFO][4127] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.777 [INFO][4127] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" iface="eth0" netns="" Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.777 [INFO][4127] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.778 [INFO][4127] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.800 [INFO][4136] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" HandleID="k8s-pod-network.c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.801 [INFO][4136] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.801 [INFO][4136] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.808 [WARNING][4136] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" HandleID="k8s-pod-network.c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.808 [INFO][4136] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" HandleID="k8s-pod-network.c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.810 [INFO][4136] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:41.813841 env[1206]: 2024-12-13 01:49:41.812 [INFO][4127] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:41.813841 env[1206]: time="2024-12-13T01:49:41.813798764Z" level=info msg="TearDown network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\" successfully" Dec 13 01:49:41.813841 env[1206]: time="2024-12-13T01:49:41.813823459Z" level=info msg="StopPodSandbox for \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\" returns successfully" Dec 13 01:49:41.814399 env[1206]: time="2024-12-13T01:49:41.814359269Z" level=info msg="RemovePodSandbox for \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\"" Dec 13 01:49:41.814432 env[1206]: time="2024-12-13T01:49:41.814394894Z" level=info msg="Forcibly stopping sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\"" Dec 13 01:49:41.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.22:22-10.0.0.1:43064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:41.838441 systemd[1]: Started sshd@15-10.0.0.22:22-10.0.0.1:43064.service. Dec 13 01:49:41.843030 kernel: kauditd_printk_skb: 846 callbacks suppressed Dec 13 01:49:41.843149 kernel: audit: type=1130 audit(1734054581.838:1293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.22:22-10.0.0.1:43064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:41.876000 audit[4166]: USER_ACCT pid=4166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:41.877725 sshd[4166]: Accepted publickey for core from 10.0.0.1 port 43064 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:41.890235 kernel: audit: type=1101 audit(1734054581.876:1294): pid=4166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:41.890350 kernel: audit: type=1103 audit(1734054581.880:1295): pid=4166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:41.890370 kernel: audit: type=1006 audit(1734054581.880:1296): pid=4166 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 01:49:41.890388 kernel: audit: type=1300 audit(1734054581.880:1296): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe74b56e30 a2=3 a3=0 items=0 ppid=1 pid=4166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.880000 audit[4166]: CRED_ACQ pid=4166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:42.004664 kernel: audit: type=1327 audit(1734054581.880:1296): proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:41.880000 audit[4166]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe74b56e30 a2=3 a3=0 items=0 ppid=1 pid=4166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:41.880000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:42.005891 kubelet[2063]: I1213 01:49:41.886667 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:49:42.004578 sshd[4166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.849 [WARNING][4158] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0", GenerateName:"calico-kube-controllers-55f8cd8f6f-", Namespace:"calico-system", SelfLink:"", UID:"0d753e72-b10a-4daf-bc52-048e56a3d5fb", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55f8cd8f6f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf", Pod:"calico-kube-controllers-55f8cd8f6f-4t7m7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali65756532698", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.849 [INFO][4158] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.849 [INFO][4158] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" iface="eth0" netns="" Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.849 [INFO][4158] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.849 [INFO][4158] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.878 [INFO][4168] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" HandleID="k8s-pod-network.c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.880 [INFO][4168] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.880 [INFO][4168] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.887 [WARNING][4168] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" HandleID="k8s-pod-network.c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.887 [INFO][4168] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" HandleID="k8s-pod-network.c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Workload="localhost-k8s-calico--kube--controllers--55f8cd8f6f--4t7m7-eth0" Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.891 [INFO][4168] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:42.006381 env[1206]: 2024-12-13 01:49:41.893 [INFO][4158] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9" Dec 13 01:49:42.006381 env[1206]: time="2024-12-13T01:49:41.894734681Z" level=info msg="TearDown network for sandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\" successfully" Dec 13 01:49:42.008934 systemd-logind[1192]: New session 16 of user core. Dec 13 01:49:42.009702 systemd[1]: Started session-16.scope. Dec 13 01:49:42.014000 audit[4166]: USER_START pid=4166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:42.015000 audit[4177]: CRED_ACQ pid=4177 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:42.022623 env[1206]: time="2024-12-13T01:49:42.022569253Z" level=info msg="RemovePodSandbox \"c5887ac2f40921a72043e33cb6c078abc4cec97107d5d21c29e4bb82567444a9\" returns successfully" Dec 13 01:49:42.023291 env[1206]: time="2024-12-13T01:49:42.023268023Z" level=info msg="StopPodSandbox for \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\"" Dec 13 01:49:42.024694 kernel: audit: type=1105 audit(1734054582.014:1297): pid=4166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:42.024786 kernel: audit: type=1103 audit(1734054582.015:1298): pid=4177 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.054 [WARNING][4194] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--2b2ms-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8e7884e0-a465-45d2-be86-19bfdd944b31", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99", Pod:"coredns-76f75df574-2b2ms", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali93916222d84", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.055 [INFO][4194] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.055 [INFO][4194] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" iface="eth0" netns="" Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.055 [INFO][4194] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.055 [INFO][4194] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.088 [INFO][4204] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" HandleID="k8s-pod-network.2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.088 [INFO][4204] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.088 [INFO][4204] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.096 [WARNING][4204] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" HandleID="k8s-pod-network.2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.096 [INFO][4204] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" HandleID="k8s-pod-network.2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.098 [INFO][4204] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:42.101558 env[1206]: 2024-12-13 01:49:42.099 [INFO][4194] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:42.101558 env[1206]: time="2024-12-13T01:49:42.100943621Z" level=info msg="TearDown network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\" successfully" Dec 13 01:49:42.101558 env[1206]: time="2024-12-13T01:49:42.100972012Z" level=info msg="StopPodSandbox for \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\" returns successfully" Dec 13 01:49:42.101558 env[1206]: time="2024-12-13T01:49:42.101415877Z" level=info msg="RemovePodSandbox for \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\"" Dec 13 01:49:42.101558 env[1206]: time="2024-12-13T01:49:42.101445933Z" level=info msg="Forcibly stopping sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\"" Dec 13 01:49:42.137439 sshd[4166]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:42.137000 audit[4166]: USER_END pid=4166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:42.139577 systemd[1]: sshd@15-10.0.0.22:22-10.0.0.1:43064.service: Deactivated successfully. Dec 13 01:49:42.140347 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 01:49:42.138000 audit[4166]: CRED_DISP pid=4166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:42.141192 systemd-logind[1192]: Session 16 logged out. Waiting for processes to exit. Dec 13 01:49:42.141975 systemd-logind[1192]: Removed session 16. Dec 13 01:49:42.146769 kernel: audit: type=1106 audit(1734054582.137:1299): pid=4166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:42.146835 kernel: audit: type=1104 audit(1734054582.138:1300): pid=4166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:42.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.22:22-10.0.0.1:43064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.144 [WARNING][4236] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--2b2ms-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8e7884e0-a465-45d2-be86-19bfdd944b31", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cbc9438f672b4ec2cebbe7675dddddd137c4d4b7398b91fbc9397fd8677a7a99", Pod:"coredns-76f75df574-2b2ms", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali93916222d84", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.145 [INFO][4236] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.145 [INFO][4236] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" iface="eth0" netns="" Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.145 [INFO][4236] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.145 [INFO][4236] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.163 [INFO][4245] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" HandleID="k8s-pod-network.2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.163 [INFO][4245] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.163 [INFO][4245] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.169 [WARNING][4245] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" HandleID="k8s-pod-network.2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.169 [INFO][4245] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" HandleID="k8s-pod-network.2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Workload="localhost-k8s-coredns--76f75df574--2b2ms-eth0" Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.170 [INFO][4245] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:42.173957 env[1206]: 2024-12-13 01:49:42.171 [INFO][4236] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca" Dec 13 01:49:42.174410 env[1206]: time="2024-12-13T01:49:42.173982970Z" level=info msg="TearDown network for sandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\" successfully" Dec 13 01:49:42.177495 env[1206]: time="2024-12-13T01:49:42.177463820Z" level=info msg="RemovePodSandbox \"2af92b8916f291c369da5a127bc311a7965a39b8fa9d4862c8c27d217ba651ca\" returns successfully" Dec 13 01:49:42.177996 env[1206]: time="2024-12-13T01:49:42.177956505Z" level=info msg="StopPodSandbox for \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\"" Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.210 [WARNING][4268] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0", GenerateName:"calico-apiserver-8fbdb9594-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a146104-b9e8-40de-887c-c190d7aca84e", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8fbdb9594", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e", Pod:"calico-apiserver-8fbdb9594-5mmrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali658f7afff7a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.210 [INFO][4268] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.210 [INFO][4268] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" iface="eth0" netns="" Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.210 [INFO][4268] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.210 [INFO][4268] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.233 [INFO][4276] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" HandleID="k8s-pod-network.7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.233 [INFO][4276] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.233 [INFO][4276] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.238 [WARNING][4276] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" HandleID="k8s-pod-network.7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.238 [INFO][4276] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" HandleID="k8s-pod-network.7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.239 [INFO][4276] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:42.242912 env[1206]: 2024-12-13 01:49:42.241 [INFO][4268] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:42.243370 env[1206]: time="2024-12-13T01:49:42.242937872Z" level=info msg="TearDown network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\" successfully" Dec 13 01:49:42.243370 env[1206]: time="2024-12-13T01:49:42.242969349Z" level=info msg="StopPodSandbox for \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\" returns successfully" Dec 13 01:49:42.243419 env[1206]: time="2024-12-13T01:49:42.243396896Z" level=info msg="RemovePodSandbox for \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\"" Dec 13 01:49:42.243456 env[1206]: time="2024-12-13T01:49:42.243420879Z" level=info msg="Forcibly stopping sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\"" Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.273 [WARNING][4299] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0", GenerateName:"calico-apiserver-8fbdb9594-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a146104-b9e8-40de-887c-c190d7aca84e", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8fbdb9594", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"26ae14f545fb267bd713205e416138ada2c998dd073e553af71a1e222992cc0e", Pod:"calico-apiserver-8fbdb9594-5mmrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali658f7afff7a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.274 [INFO][4299] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.274 [INFO][4299] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" iface="eth0" netns="" Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.274 [INFO][4299] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.274 [INFO][4299] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.291 [INFO][4306] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" HandleID="k8s-pod-network.7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.291 [INFO][4306] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.291 [INFO][4306] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.296 [WARNING][4306] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" HandleID="k8s-pod-network.7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.296 [INFO][4306] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" HandleID="k8s-pod-network.7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Workload="localhost-k8s-calico--apiserver--8fbdb9594--5mmrr-eth0" Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.298 [INFO][4306] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:42.301653 env[1206]: 2024-12-13 01:49:42.299 [INFO][4299] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa" Dec 13 01:49:42.301653 env[1206]: time="2024-12-13T01:49:42.301599643Z" level=info msg="TearDown network for sandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\" successfully" Dec 13 01:49:42.305035 env[1206]: time="2024-12-13T01:49:42.305005438Z" level=info msg="RemovePodSandbox \"7cacf5c1da94900ec1e4c52fe905790bfe54ab3ccbe1a9eaec402cf1ba51b4fa\" returns successfully" Dec 13 01:49:42.895173 env[1206]: time="2024-12-13T01:49:42.895123461Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:42.897760 env[1206]: time="2024-12-13T01:49:42.897714736Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:42.899565 env[1206]: time="2024-12-13T01:49:42.899536755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:42.900934 env[1206]: time="2024-12-13T01:49:42.900897085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:42.901327 env[1206]: time="2024-12-13T01:49:42.901289087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 01:49:42.910249 env[1206]: time="2024-12-13T01:49:42.910210878Z" level=info msg="CreateContainer within sandbox \"fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 01:49:42.920456 env[1206]: time="2024-12-13T01:49:42.920422300Z" level=info msg="CreateContainer within sandbox \"fc9e0b9f8ac186ad6e2c3461341cfe39bb207b3b5a32e10c27e8ad0c630d3ebf\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"69d2e19ebc4b60d639dc6cd73a5c0d12116454f4675e8b01b345db8f5f120396\"" Dec 13 01:49:42.921042 env[1206]: time="2024-12-13T01:49:42.921012982Z" level=info msg="StartContainer for \"69d2e19ebc4b60d639dc6cd73a5c0d12116454f4675e8b01b345db8f5f120396\"" Dec 13 01:49:42.933715 systemd[1]: Started cri-containerd-69d2e19ebc4b60d639dc6cd73a5c0d12116454f4675e8b01b345db8f5f120396.scope. Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.944000 audit: BPF prog-id=178 op=LOAD Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3832 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:42.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643265313965626334623630643633396463366364373361356330 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3832 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:42.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643265313965626334623630643633396463366364373361356330 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit: BPF prog-id=179 op=LOAD Dec 13 01:49:42.945000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000093670 items=0 ppid=3832 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:42.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643265313965626334623630643633396463366364373361356330 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit: BPF prog-id=180 op=LOAD Dec 13 01:49:42.945000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000936b8 items=0 ppid=3832 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:42.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643265313965626334623630643633396463366364373361356330 Dec 13 01:49:42.945000 audit: BPF prog-id=180 op=UNLOAD Dec 13 01:49:42.945000 audit: BPF prog-id=179 op=UNLOAD Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:42.945000 audit: BPF prog-id=181 op=LOAD Dec 13 01:49:42.945000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000093ac8 items=0 ppid=3832 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:42.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643265313965626334623630643633396463366364373361356330 Dec 13 01:49:42.969868 env[1206]: time="2024-12-13T01:49:42.969810172Z" level=info msg="StartContainer for \"69d2e19ebc4b60d639dc6cd73a5c0d12116454f4675e8b01b345db8f5f120396\" returns successfully" Dec 13 01:49:43.905083 kubelet[2063]: I1213 01:49:43.905036 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55f8cd8f6f-4t7m7" podStartSLOduration=34.245374626 podStartE2EDuration="39.904996635s" podCreationTimestamp="2024-12-13 01:49:04 +0000 UTC" firstStartedPulling="2024-12-13 01:49:37.242008108 +0000 UTC m=+55.588161978" lastFinishedPulling="2024-12-13 01:49:42.901630117 +0000 UTC m=+61.247783987" observedRunningTime="2024-12-13 01:49:43.904086558 +0000 UTC m=+62.250240428" watchObservedRunningTime="2024-12-13 01:49:43.904996635 +0000 UTC m=+62.251150506" Dec 13 01:49:44.741795 env[1206]: time="2024-12-13T01:49:44.741741466Z" level=info msg="StopPodSandbox for \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\"" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.785 [INFO][4399] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.785 [INFO][4399] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" iface="eth0" netns="/var/run/netns/cni-eac3817f-48d5-83a1-d5c4-a06b0266a9ed" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.785 [INFO][4399] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" iface="eth0" netns="/var/run/netns/cni-eac3817f-48d5-83a1-d5c4-a06b0266a9ed" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.785 [INFO][4399] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" iface="eth0" netns="/var/run/netns/cni-eac3817f-48d5-83a1-d5c4-a06b0266a9ed" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.785 [INFO][4399] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.785 [INFO][4399] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.802 [INFO][4407] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" HandleID="k8s-pod-network.c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Workload="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.802 [INFO][4407] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.802 [INFO][4407] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.806 [WARNING][4407] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" HandleID="k8s-pod-network.c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Workload="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.807 [INFO][4407] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" HandleID="k8s-pod-network.c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Workload="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.807 [INFO][4407] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:44.810498 env[1206]: 2024-12-13 01:49:44.809 [INFO][4399] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31" Dec 13 01:49:44.813750 env[1206]: time="2024-12-13T01:49:44.811603393Z" level=info msg="TearDown network for sandbox \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\" successfully" Dec 13 01:49:44.813750 env[1206]: time="2024-12-13T01:49:44.811640360Z" level=info msg="StopPodSandbox for \"c89568b0c013c06d2aff00d45b072423442b6ad7939c89f2d78327cfd5182d31\" returns successfully" Dec 13 01:49:44.813750 env[1206]: time="2024-12-13T01:49:44.812227382Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8fbdb9594-795pg,Uid:3a0c5520-4e5d-444e-9889-cfefde6f6729,Namespace:calico-apiserver,Attempt:1,}" Dec 13 01:49:44.812974 systemd[1]: run-netns-cni\x2deac3817f\x2d48d5\x2d83a1\x2dd5c4\x2da06b0266a9ed.mount: Deactivated successfully. Dec 13 01:49:44.899775 systemd-networkd[1028]: calic8c7c2a4363: Link UP Dec 13 01:49:44.902136 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:49:44.902202 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic8c7c2a4363: link becomes ready Dec 13 01:49:44.902281 systemd-networkd[1028]: calic8c7c2a4363: Gained carrier Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.847 [INFO][4416] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0 calico-apiserver-8fbdb9594- calico-apiserver 3a0c5520-4e5d-444e-9889-cfefde6f6729 997 0 2024-12-13 01:49:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8fbdb9594 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-8fbdb9594-795pg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic8c7c2a4363 [] []}} ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-795pg" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--795pg-" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.847 [INFO][4416] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-795pg" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.868 [INFO][4430] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" HandleID="k8s-pod-network.96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Workload="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.874 [INFO][4430] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" HandleID="k8s-pod-network.96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Workload="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ff00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-8fbdb9594-795pg", "timestamp":"2024-12-13 01:49:44.868590756 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.874 [INFO][4430] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.874 [INFO][4430] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.874 [INFO][4430] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.876 [INFO][4430] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" host="localhost" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.879 [INFO][4430] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.882 [INFO][4430] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.883 [INFO][4430] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.885 [INFO][4430] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.885 [INFO][4430] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" host="localhost" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.886 [INFO][4430] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6 Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.890 [INFO][4430] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" host="localhost" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.895 [INFO][4430] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" host="localhost" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.896 [INFO][4430] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" host="localhost" Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.896 [INFO][4430] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:44.914628 env[1206]: 2024-12-13 01:49:44.896 [INFO][4430] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" HandleID="k8s-pod-network.96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Workload="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.915352 env[1206]: 2024-12-13 01:49:44.897 [INFO][4416] cni-plugin/k8s.go 386: Populated endpoint ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-795pg" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0", GenerateName:"calico-apiserver-8fbdb9594-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a0c5520-4e5d-444e-9889-cfefde6f6729", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8fbdb9594", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-8fbdb9594-795pg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic8c7c2a4363", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:44.915352 env[1206]: 2024-12-13 01:49:44.898 [INFO][4416] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-795pg" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.915352 env[1206]: 2024-12-13 01:49:44.898 [INFO][4416] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic8c7c2a4363 ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-795pg" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.915352 env[1206]: 2024-12-13 01:49:44.902 [INFO][4416] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-795pg" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.915352 env[1206]: 2024-12-13 01:49:44.902 [INFO][4416] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-795pg" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0", GenerateName:"calico-apiserver-8fbdb9594-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a0c5520-4e5d-444e-9889-cfefde6f6729", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8fbdb9594", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6", Pod:"calico-apiserver-8fbdb9594-795pg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic8c7c2a4363", MAC:"02:71:c0:87:62:84", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:44.915352 env[1206]: 2024-12-13 01:49:44.912 [INFO][4416] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6" Namespace="calico-apiserver" Pod="calico-apiserver-8fbdb9594-795pg" WorkloadEndpoint="localhost-k8s-calico--apiserver--8fbdb9594--795pg-eth0" Dec 13 01:49:44.923000 audit[4455]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4455 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:44.923000 audit[4455]: SYSCALL arch=c000003e syscall=46 success=yes exit=21500 a0=3 a1=7fff6f9398f0 a2=0 a3=7fff6f9398dc items=0 ppid=3652 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.923000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:44.926214 env[1206]: time="2024-12-13T01:49:44.926140876Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:44.926214 env[1206]: time="2024-12-13T01:49:44.926181450Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:44.926214 env[1206]: time="2024-12-13T01:49:44.926193992Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:44.926372 env[1206]: time="2024-12-13T01:49:44.926335621Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6 pid=4463 runtime=io.containerd.runc.v2 Dec 13 01:49:44.940821 systemd[1]: run-containerd-runc-k8s.io-96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6-runc.nYAoPa.mount: Deactivated successfully. Dec 13 01:49:44.945810 systemd[1]: Started cri-containerd-96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6.scope. Dec 13 01:49:44.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit: BPF prog-id=182 op=LOAD Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4463 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633934353863363535643437336531326164386636623537653832 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4463 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633934353863363535643437336531326164386636623537653832 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit: BPF prog-id=183 op=LOAD Dec 13 01:49:44.957000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003968f0 items=0 ppid=4463 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633934353863363535643437336531326164386636623537653832 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit: BPF prog-id=184 op=LOAD Dec 13 01:49:44.957000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000396938 items=0 ppid=4463 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633934353863363535643437336531326164386636623537653832 Dec 13 01:49:44.957000 audit: BPF prog-id=184 op=UNLOAD Dec 13 01:49:44.957000 audit: BPF prog-id=183 op=UNLOAD Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:44.957000 audit: BPF prog-id=185 op=LOAD Dec 13 01:49:44.957000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000396d48 items=0 ppid=4463 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:44.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633934353863363535643437336531326164386636623537653832 Dec 13 01:49:44.958916 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:49:44.980659 env[1206]: time="2024-12-13T01:49:44.980608990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8fbdb9594-795pg,Uid:3a0c5520-4e5d-444e-9889-cfefde6f6729,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6\"" Dec 13 01:49:44.982974 env[1206]: time="2024-12-13T01:49:44.982937069Z" level=info msg="CreateContainer within sandbox \"96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 01:49:44.994655 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2703947118.mount: Deactivated successfully. Dec 13 01:49:44.999817 env[1206]: time="2024-12-13T01:49:44.999777320Z" level=info msg="CreateContainer within sandbox \"96c9458c655d473e12ad8f6b57e827babf645187dbf612e713cd234a786e94d6\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"df1395c14bfa8dbadd70505b9644fd05dfcc7a110e80474c7dfbef47bb201b1d\"" Dec 13 01:49:45.000382 env[1206]: time="2024-12-13T01:49:45.000219006Z" level=info msg="StartContainer for \"df1395c14bfa8dbadd70505b9644fd05dfcc7a110e80474c7dfbef47bb201b1d\"" Dec 13 01:49:45.014072 systemd[1]: Started cri-containerd-df1395c14bfa8dbadd70505b9644fd05dfcc7a110e80474c7dfbef47bb201b1d.scope. Dec 13 01:49:45.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit: BPF prog-id=186 op=LOAD Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4463 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466313339356331346266613864626164643730353035623936343466 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4463 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466313339356331346266613864626164643730353035623936343466 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit: BPF prog-id=187 op=LOAD Dec 13 01:49:45.026000 audit[4506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025bd10 items=0 ppid=4463 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466313339356331346266613864626164643730353035623936343466 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit: BPF prog-id=188 op=LOAD Dec 13 01:49:45.026000 audit[4506]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025bd58 items=0 ppid=4463 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466313339356331346266613864626164643730353035623936343466 Dec 13 01:49:45.026000 audit: BPF prog-id=188 op=UNLOAD Dec 13 01:49:45.026000 audit: BPF prog-id=187 op=UNLOAD Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { perfmon } for pid=4506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit[4506]: AVC avc: denied { bpf } for pid=4506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:45.026000 audit: BPF prog-id=189 op=LOAD Dec 13 01:49:45.026000 audit[4506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6168 items=0 ppid=4463 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466313339356331346266613864626164643730353035623936343466 Dec 13 01:49:45.052476 env[1206]: time="2024-12-13T01:49:45.052416099Z" level=info msg="StartContainer for \"df1395c14bfa8dbadd70505b9644fd05dfcc7a110e80474c7dfbef47bb201b1d\" returns successfully" Dec 13 01:49:45.920000 audit[4538]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:45.920000 audit[4538]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe3e80e720 a2=0 a3=7ffe3e80e70c items=0 ppid=2224 pid=4538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:45.924000 audit[4538]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=4538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:45.924000 audit[4538]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe3e80e720 a2=0 a3=7ffe3e80e70c items=0 ppid=2224 pid=4538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:45.924000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:46.177657 systemd-networkd[1028]: calic8c7c2a4363: Gained IPv6LL Dec 13 01:49:46.234000 audit[4517]: AVC avc: denied { watch } for pid=4517 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_22.2408513117/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c707,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c707,c938 tclass=file permissive=0 Dec 13 01:49:46.234000 audit[4517]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0006e00c0 a2=fc6 a3=0 items=0 ppid=4463 pid=4517 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c707,c938 key=(null) Dec 13 01:49:46.234000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:49:46.902102 kubelet[2063]: I1213 01:49:46.902069 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:49:47.139899 systemd[1]: Started sshd@16-10.0.0.22:22-10.0.0.1:57686.service. Dec 13 01:49:47.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.22:22-10.0.0.1:57686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:47.141223 kernel: kauditd_printk_skb: 184 callbacks suppressed Dec 13 01:49:47.141274 kernel: audit: type=1130 audit(1734054587.139:1360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.22:22-10.0.0.1:57686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:47.171000 audit[4540]: USER_ACCT pid=4540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.172203 sshd[4540]: Accepted publickey for core from 10.0.0.1 port 57686 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:47.174147 sshd[4540]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:47.173000 audit[4540]: CRED_ACQ pid=4540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.178833 systemd-logind[1192]: New session 17 of user core. Dec 13 01:49:47.179254 systemd[1]: Started session-17.scope. Dec 13 01:49:47.181296 kernel: audit: type=1101 audit(1734054587.171:1361): pid=4540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.181362 kernel: audit: type=1103 audit(1734054587.173:1362): pid=4540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.181390 kernel: audit: type=1006 audit(1734054587.173:1363): pid=4540 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 01:49:47.188448 kernel: audit: type=1300 audit(1734054587.173:1363): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe845b3250 a2=3 a3=0 items=0 ppid=1 pid=4540 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:47.188490 kernel: audit: type=1327 audit(1734054587.173:1363): proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:47.173000 audit[4540]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe845b3250 a2=3 a3=0 items=0 ppid=1 pid=4540 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:47.173000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:47.188000 audit[4540]: USER_START pid=4540 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.194923 kernel: audit: type=1105 audit(1734054587.188:1364): pid=4540 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.194963 kernel: audit: type=1103 audit(1734054587.189:1365): pid=4542 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.189000 audit[4542]: CRED_ACQ pid=4542 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.291054 sshd[4540]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:47.291000 audit[4540]: USER_END pid=4540 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.293188 systemd[1]: sshd@16-10.0.0.22:22-10.0.0.1:57686.service: Deactivated successfully. Dec 13 01:49:47.294016 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 01:49:47.294584 systemd-logind[1192]: Session 17 logged out. Waiting for processes to exit. Dec 13 01:49:47.295277 systemd-logind[1192]: Removed session 17. Dec 13 01:49:47.291000 audit[4540]: CRED_DISP pid=4540 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.300931 kernel: audit: type=1106 audit(1734054587.291:1366): pid=4540 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.300987 kernel: audit: type=1104 audit(1734054587.291:1367): pid=4540 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:47.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.22:22-10.0.0.1:57686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:48.742027 env[1206]: time="2024-12-13T01:49:48.741974036Z" level=info msg="StopPodSandbox for \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\"" Dec 13 01:49:48.742357 env[1206]: time="2024-12-13T01:49:48.742030530Z" level=info msg="StopPodSandbox for \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\"" Dec 13 01:49:48.781755 kubelet[2063]: I1213 01:49:48.781266 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8fbdb9594-795pg" podStartSLOduration=45.781181203 podStartE2EDuration="45.781181203s" podCreationTimestamp="2024-12-13 01:49:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:45.911132902 +0000 UTC m=+64.257286772" watchObservedRunningTime="2024-12-13 01:49:48.781181203 +0000 UTC m=+67.127335073" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.794 [INFO][4593] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.794 [INFO][4593] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" iface="eth0" netns="/var/run/netns/cni-ad1fae4c-3d4e-2343-99ed-78fb73c7571e" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.795 [INFO][4593] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" iface="eth0" netns="/var/run/netns/cni-ad1fae4c-3d4e-2343-99ed-78fb73c7571e" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.795 [INFO][4593] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" iface="eth0" netns="/var/run/netns/cni-ad1fae4c-3d4e-2343-99ed-78fb73c7571e" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.795 [INFO][4593] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.795 [INFO][4593] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.814 [INFO][4613] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" HandleID="k8s-pod-network.4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Workload="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.814 [INFO][4613] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.814 [INFO][4613] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.819 [WARNING][4613] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" HandleID="k8s-pod-network.4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Workload="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.819 [INFO][4613] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" HandleID="k8s-pod-network.4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Workload="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.820 [INFO][4613] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:48.823995 env[1206]: 2024-12-13 01:49:48.821 [INFO][4593] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3" Dec 13 01:49:48.829746 systemd[1]: run-netns-cni\x2dad1fae4c\x2d3d4e\x2d2343\x2d99ed\x2d78fb73c7571e.mount: Deactivated successfully. Dec 13 01:49:48.831689 env[1206]: time="2024-12-13T01:49:48.831644104Z" level=info msg="TearDown network for sandbox \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\" successfully" Dec 13 01:49:48.831758 env[1206]: time="2024-12-13T01:49:48.831690960Z" level=info msg="StopPodSandbox for \"4a5336134b225aaeea18d6d640b5526895729caca1d8775177d9883a380ccab3\" returns successfully" Dec 13 01:49:48.832026 kubelet[2063]: E1213 01:49:48.832001 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:48.832404 env[1206]: time="2024-12-13T01:49:48.832378295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-7pgvz,Uid:c9119358-2d09-4f2c-8607-50e91d5a8662,Namespace:kube-system,Attempt:1,}" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.782 [INFO][4592] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.783 [INFO][4592] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" iface="eth0" netns="/var/run/netns/cni-2f7365d4-afaa-49cc-c063-425bcbb4e942" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.783 [INFO][4592] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" iface="eth0" netns="/var/run/netns/cni-2f7365d4-afaa-49cc-c063-425bcbb4e942" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.783 [INFO][4592] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" iface="eth0" netns="/var/run/netns/cni-2f7365d4-afaa-49cc-c063-425bcbb4e942" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.784 [INFO][4592] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.784 [INFO][4592] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.815 [INFO][4607] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" HandleID="k8s-pod-network.e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Workload="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.815 [INFO][4607] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.820 [INFO][4607] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.825 [WARNING][4607] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" HandleID="k8s-pod-network.e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Workload="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.825 [INFO][4607] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" HandleID="k8s-pod-network.e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Workload="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.826 [INFO][4607] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:48.833630 env[1206]: 2024-12-13 01:49:48.831 [INFO][4592] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a" Dec 13 01:49:48.834166 env[1206]: time="2024-12-13T01:49:48.833768335Z" level=info msg="TearDown network for sandbox \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\" successfully" Dec 13 01:49:48.834166 env[1206]: time="2024-12-13T01:49:48.833790155Z" level=info msg="StopPodSandbox for \"e405b810d973083528362591a5dd6c380bf8f4508cd0c88107dd9f37f7b6096a\" returns successfully" Dec 13 01:49:48.834289 env[1206]: time="2024-12-13T01:49:48.834197164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7cxjh,Uid:1909b05f-26da-4b80-8a43-155547fbfec0,Namespace:calico-system,Attempt:1,}" Dec 13 01:49:48.836086 systemd[1]: run-netns-cni\x2d2f7365d4\x2dafaa\x2d49cc\x2dc063\x2d425bcbb4e942.mount: Deactivated successfully. Dec 13 01:49:48.984589 systemd-networkd[1028]: cali6eb63d53a44: Link UP Dec 13 01:49:48.986457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:49:48.986511 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6eb63d53a44: link becomes ready Dec 13 01:49:48.986615 systemd-networkd[1028]: cali6eb63d53a44: Gained carrier Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.932 [INFO][4635] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--7cxjh-eth0 csi-node-driver- calico-system 1909b05f-26da-4b80-8a43-155547fbfec0 1021 0 2024-12-13 01:49:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-7cxjh eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6eb63d53a44 [] []}} ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Namespace="calico-system" Pod="csi-node-driver-7cxjh" WorkloadEndpoint="localhost-k8s-csi--node--driver--7cxjh-" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.932 [INFO][4635] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Namespace="calico-system" Pod="csi-node-driver-7cxjh" WorkloadEndpoint="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.957 [INFO][4656] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" HandleID="k8s-pod-network.d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Workload="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.963 [INFO][4656] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" HandleID="k8s-pod-network.d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Workload="localhost-k8s-csi--node--driver--7cxjh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003605f0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-7cxjh", "timestamp":"2024-12-13 01:49:48.957059985 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.963 [INFO][4656] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.963 [INFO][4656] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.963 [INFO][4656] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.964 [INFO][4656] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" host="localhost" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.967 [INFO][4656] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.969 [INFO][4656] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.971 [INFO][4656] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.972 [INFO][4656] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.972 [INFO][4656] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" host="localhost" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.973 [INFO][4656] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.976 [INFO][4656] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" host="localhost" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.980 [INFO][4656] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" host="localhost" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.980 [INFO][4656] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" host="localhost" Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.980 [INFO][4656] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:48.998051 env[1206]: 2024-12-13 01:49:48.980 [INFO][4656] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" HandleID="k8s-pod-network.d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Workload="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:48.998656 env[1206]: 2024-12-13 01:49:48.982 [INFO][4635] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Namespace="calico-system" Pod="csi-node-driver-7cxjh" WorkloadEndpoint="localhost-k8s-csi--node--driver--7cxjh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7cxjh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1909b05f-26da-4b80-8a43-155547fbfec0", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-7cxjh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6eb63d53a44", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:48.998656 env[1206]: 2024-12-13 01:49:48.983 [INFO][4635] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Namespace="calico-system" Pod="csi-node-driver-7cxjh" WorkloadEndpoint="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:48.998656 env[1206]: 2024-12-13 01:49:48.983 [INFO][4635] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6eb63d53a44 ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Namespace="calico-system" Pod="csi-node-driver-7cxjh" WorkloadEndpoint="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:48.998656 env[1206]: 2024-12-13 01:49:48.987 [INFO][4635] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Namespace="calico-system" Pod="csi-node-driver-7cxjh" WorkloadEndpoint="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:48.998656 env[1206]: 2024-12-13 01:49:48.987 [INFO][4635] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Namespace="calico-system" Pod="csi-node-driver-7cxjh" WorkloadEndpoint="localhost-k8s-csi--node--driver--7cxjh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7cxjh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1909b05f-26da-4b80-8a43-155547fbfec0", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb", Pod:"csi-node-driver-7cxjh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6eb63d53a44", MAC:"b6:dc:b2:b2:27:bd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:48.998656 env[1206]: 2024-12-13 01:49:48.994 [INFO][4635] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb" Namespace="calico-system" Pod="csi-node-driver-7cxjh" WorkloadEndpoint="localhost-k8s-csi--node--driver--7cxjh-eth0" Dec 13 01:49:49.007000 audit[4678]: NETFILTER_CFG table=filter:110 family=2 entries=38 op=nft_register_chain pid=4678 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:49.007000 audit[4678]: SYSCALL arch=c000003e syscall=46 success=yes exit=19848 a0=3 a1=7ffe296aea10 a2=0 a3=7ffe296ae9fc items=0 ppid=3652 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.007000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:49.019764 systemd-networkd[1028]: cali62abea94218: Link UP Dec 13 01:49:49.021683 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali62abea94218: link becomes ready Dec 13 01:49:49.021801 systemd-networkd[1028]: cali62abea94218: Gained carrier Dec 13 01:49:49.024270 env[1206]: time="2024-12-13T01:49:49.024208406Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:49.024395 env[1206]: time="2024-12-13T01:49:49.024371487Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:49.024483 env[1206]: time="2024-12-13T01:49:49.024461683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:49.024821 env[1206]: time="2024-12-13T01:49:49.024788536Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb pid=4691 runtime=io.containerd.runc.v2 Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.927 [INFO][4622] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--7pgvz-eth0 coredns-76f75df574- kube-system c9119358-2d09-4f2c-8607-50e91d5a8662 1022 0 2024-12-13 01:48:58 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-7pgvz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali62abea94218 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Namespace="kube-system" Pod="coredns-76f75df574-7pgvz" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--7pgvz-" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.927 [INFO][4622] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Namespace="kube-system" Pod="coredns-76f75df574-7pgvz" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.953 [INFO][4651] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" HandleID="k8s-pod-network.0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Workload="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.963 [INFO][4651] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" HandleID="k8s-pod-network.0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Workload="localhost-k8s-coredns--76f75df574--7pgvz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000134540), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-7pgvz", "timestamp":"2024-12-13 01:49:48.95347232 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.963 [INFO][4651] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.980 [INFO][4651] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.980 [INFO][4651] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.981 [INFO][4651] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" host="localhost" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.987 [INFO][4651] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.996 [INFO][4651] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:48.999 [INFO][4651] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:49.001 [INFO][4651] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:49.001 [INFO][4651] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" host="localhost" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:49.003 [INFO][4651] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450 Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:49.007 [INFO][4651] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" host="localhost" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:49.014 [INFO][4651] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" host="localhost" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:49.014 [INFO][4651] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" host="localhost" Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:49.014 [INFO][4651] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:49.033758 env[1206]: 2024-12-13 01:49:49.014 [INFO][4651] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" HandleID="k8s-pod-network.0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Workload="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:49.034483 env[1206]: 2024-12-13 01:49:49.017 [INFO][4622] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Namespace="kube-system" Pod="coredns-76f75df574-7pgvz" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--7pgvz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--7pgvz-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"c9119358-2d09-4f2c-8607-50e91d5a8662", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-7pgvz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali62abea94218", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:49.034483 env[1206]: 2024-12-13 01:49:49.017 [INFO][4622] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Namespace="kube-system" Pod="coredns-76f75df574-7pgvz" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:49.034483 env[1206]: 2024-12-13 01:49:49.017 [INFO][4622] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali62abea94218 ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Namespace="kube-system" Pod="coredns-76f75df574-7pgvz" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:49.034483 env[1206]: 2024-12-13 01:49:49.022 [INFO][4622] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Namespace="kube-system" Pod="coredns-76f75df574-7pgvz" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:49.034483 env[1206]: 2024-12-13 01:49:49.022 [INFO][4622] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Namespace="kube-system" Pod="coredns-76f75df574-7pgvz" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--7pgvz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--7pgvz-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"c9119358-2d09-4f2c-8607-50e91d5a8662", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450", Pod:"coredns-76f75df574-7pgvz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali62abea94218", MAC:"52:c3:4f:f3:ef:1c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:49.034483 env[1206]: 2024-12-13 01:49:49.031 [INFO][4622] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450" Namespace="kube-system" Pod="coredns-76f75df574-7pgvz" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--7pgvz-eth0" Dec 13 01:49:49.039895 systemd[1]: Started cri-containerd-d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb.scope. Dec 13 01:49:49.041000 audit[4718]: NETFILTER_CFG table=filter:111 family=2 entries=38 op=nft_register_chain pid=4718 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:49.041000 audit[4718]: SYSCALL arch=c000003e syscall=46 success=yes exit=19432 a0=3 a1=7ffc28cfd4d0 a2=0 a3=7ffc28cfd4bc items=0 ppid=3652 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.041000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:49.048717 env[1206]: time="2024-12-13T01:49:49.048646021Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:49.048855 env[1206]: time="2024-12-13T01:49:49.048693549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:49.048855 env[1206]: time="2024-12-13T01:49:49.048704088Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:49.048966 env[1206]: time="2024-12-13T01:49:49.048848756Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450 pid=4740 runtime=io.containerd.runc.v2 Dec 13 01:49:49.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit: BPF prog-id=190 op=LOAD Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4691 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323434366366386265626134313965663664626163656635653462 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4691 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323434366366386265626134313965663664626163656635653462 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit: BPF prog-id=191 op=LOAD Dec 13 01:49:49.053000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00032d960 items=0 ppid=4691 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323434366366386265626134313965663664626163656635653462 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit: BPF prog-id=192 op=LOAD Dec 13 01:49:49.053000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00032d9a8 items=0 ppid=4691 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323434366366386265626134313965663664626163656635653462 Dec 13 01:49:49.053000 audit: BPF prog-id=192 op=UNLOAD Dec 13 01:49:49.053000 audit: BPF prog-id=191 op=UNLOAD Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.053000 audit: BPF prog-id=193 op=LOAD Dec 13 01:49:49.053000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00032ddb8 items=0 ppid=4691 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323434366366386265626134313965663664626163656635653462 Dec 13 01:49:49.055310 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:49:49.064901 env[1206]: time="2024-12-13T01:49:49.064852451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7cxjh,Uid:1909b05f-26da-4b80-8a43-155547fbfec0,Namespace:calico-system,Attempt:1,} returns sandbox id \"d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb\"" Dec 13 01:49:49.067343 env[1206]: time="2024-12-13T01:49:49.067320995Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 01:49:49.067803 systemd[1]: Started cri-containerd-0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450.scope. Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.076000 audit: BPF prog-id=194 op=LOAD Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4740 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323061656361636136366433326563613663353765323732356234 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4740 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323061656361636136366433326563613663353765323732356234 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit: BPF prog-id=195 op=LOAD Dec 13 01:49:49.077000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00037eee0 items=0 ppid=4740 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323061656361636136366433326563613663353765323732356234 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit: BPF prog-id=196 op=LOAD Dec 13 01:49:49.077000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00037ef28 items=0 ppid=4740 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323061656361636136366433326563613663353765323732356234 Dec 13 01:49:49.077000 audit: BPF prog-id=196 op=UNLOAD Dec 13 01:49:49.077000 audit: BPF prog-id=195 op=UNLOAD Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.077000 audit: BPF prog-id=197 op=LOAD Dec 13 01:49:49.077000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00037f338 items=0 ppid=4740 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323061656361636136366433326563613663353765323732356234 Dec 13 01:49:49.078586 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:49:49.101239 env[1206]: time="2024-12-13T01:49:49.101183770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-7pgvz,Uid:c9119358-2d09-4f2c-8607-50e91d5a8662,Namespace:kube-system,Attempt:1,} returns sandbox id \"0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450\"" Dec 13 01:49:49.101846 kubelet[2063]: E1213 01:49:49.101824 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:49.103885 env[1206]: time="2024-12-13T01:49:49.103656593Z" level=info msg="CreateContainer within sandbox \"0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 01:49:49.116347 env[1206]: time="2024-12-13T01:49:49.116299458Z" level=info msg="CreateContainer within sandbox \"0d20aecaca66d32eca6c57e2725b414a6de1139d917514dab720c010cea3e450\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ebb64d294054efe41bbdc22c9c7aa1c5e84fe72c44292de049b210f97d1c9235\"" Dec 13 01:49:49.116869 env[1206]: time="2024-12-13T01:49:49.116844804Z" level=info msg="StartContainer for \"ebb64d294054efe41bbdc22c9c7aa1c5e84fe72c44292de049b210f97d1c9235\"" Dec 13 01:49:49.130723 systemd[1]: Started cri-containerd-ebb64d294054efe41bbdc22c9c7aa1c5e84fe72c44292de049b210f97d1c9235.scope. Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit: BPF prog-id=198 op=LOAD Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4740 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623634643239343035346566653431626264633232633963376161 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4740 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623634643239343035346566653431626264633232633963376161 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit: BPF prog-id=199 op=LOAD Dec 13 01:49:49.141000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a6c20 items=0 ppid=4740 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623634643239343035346566653431626264633232633963376161 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit: BPF prog-id=200 op=LOAD Dec 13 01:49:49.141000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a6c68 items=0 ppid=4740 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623634643239343035346566653431626264633232633963376161 Dec 13 01:49:49.141000 audit: BPF prog-id=200 op=UNLOAD Dec 13 01:49:49.141000 audit: BPF prog-id=199 op=UNLOAD Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:49.141000 audit: BPF prog-id=201 op=LOAD Dec 13 01:49:49.141000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a7078 items=0 ppid=4740 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623634643239343035346566653431626264633232633963376161 Dec 13 01:49:49.154226 env[1206]: time="2024-12-13T01:49:49.154189543Z" level=info msg="StartContainer for \"ebb64d294054efe41bbdc22c9c7aa1c5e84fe72c44292de049b210f97d1c9235\" returns successfully" Dec 13 01:49:49.909076 kubelet[2063]: E1213 01:49:49.909038 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:49.917299 kubelet[2063]: I1213 01:49:49.917276 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-7pgvz" podStartSLOduration=51.917242757 podStartE2EDuration="51.917242757s" podCreationTimestamp="2024-12-13 01:48:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:49.916502481 +0000 UTC m=+68.262656350" watchObservedRunningTime="2024-12-13 01:49:49.917242757 +0000 UTC m=+68.263396627" Dec 13 01:49:49.927000 audit[4822]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.927000 audit[4822]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdd32fc140 a2=0 a3=7ffdd32fc12c items=0 ppid=2224 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.934000 audit[4822]: NETFILTER_CFG table=nat:113 family=2 entries=44 op=nft_register_rule pid=4822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.934000 audit[4822]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdd32fc140 a2=0 a3=7ffdd32fc12c items=0 ppid=2224 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.952000 audit[4824]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=4824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.952000 audit[4824]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd7ff19bc0 a2=0 a3=7ffd7ff19bac items=0 ppid=2224 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.952000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:49.961000 audit[4824]: NETFILTER_CFG table=nat:115 family=2 entries=56 op=nft_register_chain pid=4824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:49.961000 audit[4824]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd7ff19bc0 a2=0 a3=7ffd7ff19bac items=0 ppid=2224 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:49.961000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:50.657690 systemd-networkd[1028]: cali6eb63d53a44: Gained IPv6LL Dec 13 01:49:50.723788 env[1206]: time="2024-12-13T01:49:50.723744072Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:50.785670 systemd-networkd[1028]: cali62abea94218: Gained IPv6LL Dec 13 01:49:50.824847 env[1206]: time="2024-12-13T01:49:50.824809470Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:50.872799 env[1206]: time="2024-12-13T01:49:50.872757687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:50.891345 env[1206]: time="2024-12-13T01:49:50.891315542Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:50.891768 env[1206]: time="2024-12-13T01:49:50.891740719Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 01:49:50.893081 env[1206]: time="2024-12-13T01:49:50.893059416Z" level=info msg="CreateContainer within sandbox \"d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 01:49:50.910500 kubelet[2063]: E1213 01:49:50.910411 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:51.314796 env[1206]: time="2024-12-13T01:49:51.314580862Z" level=info msg="CreateContainer within sandbox \"d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2905226f649ad6d6e36312c9c4560fef05a927e2ce7bfdb839e0f278021febb0\"" Dec 13 01:49:51.315107 env[1206]: time="2024-12-13T01:49:51.315068836Z" level=info msg="StartContainer for \"2905226f649ad6d6e36312c9c4560fef05a927e2ce7bfdb839e0f278021febb0\"" Dec 13 01:49:51.332669 systemd[1]: Started cri-containerd-2905226f649ad6d6e36312c9c4560fef05a927e2ce7bfdb839e0f278021febb0.scope. Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f74e84a7cc8 items=0 ppid=4691 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:51.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303532323666363439616436643665333633313263396334353630 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit: BPF prog-id=202 op=LOAD Dec 13 01:49:51.342000 audit[4833]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000304e48 items=0 ppid=4691 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:51.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303532323666363439616436643665333633313263396334353630 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit: BPF prog-id=203 op=LOAD Dec 13 01:49:51.342000 audit[4833]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000304e98 items=0 ppid=4691 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:51.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303532323666363439616436643665333633313263396334353630 Dec 13 01:49:51.342000 audit: BPF prog-id=203 op=UNLOAD Dec 13 01:49:51.342000 audit: BPF prog-id=202 op=UNLOAD Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:51.342000 audit: BPF prog-id=204 op=LOAD Dec 13 01:49:51.342000 audit[4833]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000304f28 items=0 ppid=4691 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:51.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303532323666363439616436643665333633313263396334353630 Dec 13 01:49:51.354647 env[1206]: time="2024-12-13T01:49:51.354614219Z" level=info msg="StartContainer for \"2905226f649ad6d6e36312c9c4560fef05a927e2ce7bfdb839e0f278021febb0\" returns successfully" Dec 13 01:49:51.357216 env[1206]: time="2024-12-13T01:49:51.357185071Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 01:49:51.914031 kubelet[2063]: E1213 01:49:51.913986 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:52.158256 systemd[1]: run-containerd-runc-k8s.io-69d2e19ebc4b60d639dc6cd73a5c0d12116454f4675e8b01b345db8f5f120396-runc.61nsxd.mount: Deactivated successfully. Dec 13 01:49:52.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.22:22-10.0.0.1:57690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:52.295038 systemd[1]: Started sshd@17-10.0.0.22:22-10.0.0.1:57690.service. Dec 13 01:49:52.296386 kernel: kauditd_printk_skb: 233 callbacks suppressed Dec 13 01:49:52.296511 kernel: audit: type=1130 audit(1734054592.293:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.22:22-10.0.0.1:57690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:52.325000 audit[4882]: USER_ACCT pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.327055 sshd[4882]: Accepted publickey for core from 10.0.0.1 port 57690 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:52.329072 sshd[4882]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:52.327000 audit[4882]: CRED_ACQ pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.332906 systemd-logind[1192]: New session 18 of user core. Dec 13 01:49:52.334013 systemd[1]: Started session-18.scope. Dec 13 01:49:52.335624 kernel: audit: type=1101 audit(1734054592.325:1436): pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.335673 kernel: audit: type=1103 audit(1734054592.327:1437): pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.335692 kernel: audit: type=1006 audit(1734054592.327:1438): pid=4882 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 01:49:52.327000 audit[4882]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47787f10 a2=3 a3=0 items=0 ppid=1 pid=4882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:52.342539 kernel: audit: type=1300 audit(1734054592.327:1438): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47787f10 a2=3 a3=0 items=0 ppid=1 pid=4882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:52.342574 kernel: audit: type=1327 audit(1734054592.327:1438): proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:52.327000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:52.336000 audit[4882]: USER_START pid=4882 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.348110 kernel: audit: type=1105 audit(1734054592.336:1439): pid=4882 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.348143 kernel: audit: type=1103 audit(1734054592.337:1440): pid=4884 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.337000 audit[4884]: CRED_ACQ pid=4884 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.446092 sshd[4882]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:52.445000 audit[4882]: USER_END pid=4882 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.448965 systemd[1]: sshd@17-10.0.0.22:22-10.0.0.1:57690.service: Deactivated successfully. Dec 13 01:49:52.449501 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 01:49:52.450028 systemd-logind[1192]: Session 18 logged out. Waiting for processes to exit. Dec 13 01:49:52.451090 systemd[1]: Started sshd@18-10.0.0.22:22-10.0.0.1:57694.service. Dec 13 01:49:52.451881 systemd-logind[1192]: Removed session 18. Dec 13 01:49:52.456669 kernel: audit: type=1106 audit(1734054592.445:1441): pid=4882 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.456886 kernel: audit: type=1104 audit(1734054592.445:1442): pid=4882 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.445000 audit[4882]: CRED_DISP pid=4882 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.22:22-10.0.0.1:57690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:52.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.22:22-10.0.0.1:57694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:52.478000 audit[4896]: USER_ACCT pid=4896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.480187 sshd[4896]: Accepted publickey for core from 10.0.0.1 port 57694 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:52.479000 audit[4896]: CRED_ACQ pid=4896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.479000 audit[4896]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaade2ee0 a2=3 a3=0 items=0 ppid=1 pid=4896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:52.479000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:52.481059 sshd[4896]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:52.484711 systemd-logind[1192]: New session 19 of user core. Dec 13 01:49:52.485804 systemd[1]: Started session-19.scope. Dec 13 01:49:52.488000 audit[4896]: USER_START pid=4896 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.490000 audit[4898]: CRED_ACQ pid=4898 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.833454 sshd[4896]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:52.833000 audit[4896]: USER_END pid=4896 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.833000 audit[4896]: CRED_DISP pid=4896 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.837359 systemd[1]: Started sshd@19-10.0.0.22:22-10.0.0.1:57706.service. Dec 13 01:49:52.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.22:22-10.0.0.1:57706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:52.838777 systemd[1]: sshd@18-10.0.0.22:22-10.0.0.1:57694.service: Deactivated successfully. Dec 13 01:49:52.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.22:22-10.0.0.1:57694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:52.839294 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 01:49:52.840107 systemd-logind[1192]: Session 19 logged out. Waiting for processes to exit. Dec 13 01:49:52.840834 systemd-logind[1192]: Removed session 19. Dec 13 01:49:52.869000 audit[4907]: USER_ACCT pid=4907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.871570 sshd[4907]: Accepted publickey for core from 10.0.0.1 port 57706 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:52.870000 audit[4907]: CRED_ACQ pid=4907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.870000 audit[4907]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbefe03d0 a2=3 a3=0 items=0 ppid=1 pid=4907 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:52.870000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:52.872794 sshd[4907]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:52.876898 systemd-logind[1192]: New session 20 of user core. Dec 13 01:49:52.877956 systemd[1]: Started session-20.scope. Dec 13 01:49:52.881000 audit[4907]: USER_START pid=4907 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.882000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:52.939767 env[1206]: time="2024-12-13T01:49:52.939717086Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:52.941612 env[1206]: time="2024-12-13T01:49:52.941572819Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:52.943068 env[1206]: time="2024-12-13T01:49:52.943038128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:52.944415 env[1206]: time="2024-12-13T01:49:52.944381080Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:52.944887 env[1206]: time="2024-12-13T01:49:52.944852255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 01:49:52.946729 env[1206]: time="2024-12-13T01:49:52.946697809Z" level=info msg="CreateContainer within sandbox \"d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 01:49:52.959660 env[1206]: time="2024-12-13T01:49:52.959187564Z" level=info msg="CreateContainer within sandbox \"d92446cf8beba419ef6dbacef5e4b04dbd0b365be0f6ecda08309e0c7268f7bb\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"dd976c177a68889d3a37fe5b527818fb990e8a94485ca68dd4f5bc2d5116e9c6\"" Dec 13 01:49:52.960932 env[1206]: time="2024-12-13T01:49:52.959912370Z" level=info msg="StartContainer for \"dd976c177a68889d3a37fe5b527818fb990e8a94485ca68dd4f5bc2d5116e9c6\"" Dec 13 01:49:52.999169 systemd[1]: Started cri-containerd-dd976c177a68889d3a37fe5b527818fb990e8a94485ca68dd4f5bc2d5116e9c6.scope. Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f465a6fca98 items=0 ppid=4691 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393736633137376136383838396433613337666535623532373831 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit: BPF prog-id=205 op=LOAD Dec 13 01:49:53.011000 audit[4927]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f3f68 items=0 ppid=4691 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393736633137376136383838396433613337666535623532373831 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit: BPF prog-id=206 op=LOAD Dec 13 01:49:53.011000 audit[4927]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002f3fb8 items=0 ppid=4691 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393736633137376136383838396433613337666535623532373831 Dec 13 01:49:53.011000 audit: BPF prog-id=206 op=UNLOAD Dec 13 01:49:53.011000 audit: BPF prog-id=205 op=UNLOAD Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:53.011000 audit: BPF prog-id=207 op=LOAD Dec 13 01:49:53.011000 audit[4927]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003de048 items=0 ppid=4691 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464393736633137376136383838396433613337666535623532373831 Dec 13 01:49:53.028214 env[1206]: time="2024-12-13T01:49:53.028151769Z" level=info msg="StartContainer for \"dd976c177a68889d3a37fe5b527818fb990e8a94485ca68dd4f5bc2d5116e9c6\" returns successfully" Dec 13 01:49:53.801654 kubelet[2063]: I1213 01:49:53.801606 2063 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 01:49:53.802705 kubelet[2063]: I1213 01:49:53.802684 2063 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 01:49:54.231000 audit[4964]: NETFILTER_CFG table=filter:116 family=2 entries=22 op=nft_register_rule pid=4964 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:54.231000 audit[4964]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffcf28f6620 a2=0 a3=7ffcf28f660c items=0 ppid=2224 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.231000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:54.238582 sshd[4907]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:54.237000 audit[4907]: USER_END pid=4907 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.238000 audit[4907]: CRED_DISP pid=4907 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.241323 systemd[1]: sshd@19-10.0.0.22:22-10.0.0.1:57706.service: Deactivated successfully. Dec 13 01:49:54.241896 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 01:49:54.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.22:22-10.0.0.1:57706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:54.240000 audit[4964]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4964 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:54.240000 audit[4964]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcf28f6620 a2=0 a3=0 items=0 ppid=2224 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:54.243033 systemd-logind[1192]: Session 20 logged out. Waiting for processes to exit. Dec 13 01:49:54.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.22:22-10.0.0.1:57712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:54.243859 systemd[1]: Started sshd@20-10.0.0.22:22-10.0.0.1:57712.service. Dec 13 01:49:54.245036 systemd-logind[1192]: Removed session 20. Dec 13 01:49:54.252000 audit[4970]: NETFILTER_CFG table=filter:118 family=2 entries=34 op=nft_register_rule pid=4970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:54.252000 audit[4970]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffe404faeb0 a2=0 a3=7ffe404fae9c items=0 ppid=2224 pid=4970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:54.256000 audit[4970]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:54.256000 audit[4970]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe404faeb0 a2=0 a3=0 items=0 ppid=2224 pid=4970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:54.272000 audit[4967]: USER_ACCT pid=4967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.273715 sshd[4967]: Accepted publickey for core from 10.0.0.1 port 57712 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:54.273000 audit[4967]: CRED_ACQ pid=4967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.273000 audit[4967]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd9ad2f30 a2=3 a3=0 items=0 ppid=1 pid=4967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:54.275167 sshd[4967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:54.278660 systemd-logind[1192]: New session 21 of user core. Dec 13 01:49:54.279392 systemd[1]: Started session-21.scope. Dec 13 01:49:54.282000 audit[4967]: USER_START pid=4967 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.283000 audit[4971]: CRED_ACQ pid=4971 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.531431 sshd[4967]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:54.534143 systemd[1]: Started sshd@21-10.0.0.22:22-10.0.0.1:57720.service. Dec 13 01:49:54.536643 systemd[1]: sshd@20-10.0.0.22:22-10.0.0.1:57712.service: Deactivated successfully. Dec 13 01:49:54.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.22:22-10.0.0.1:57720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:54.533000 audit[4967]: USER_END pid=4967 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.533000 audit[4967]: CRED_DISP pid=4967 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.22:22-10.0.0.1:57712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:54.537340 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 01:49:54.538262 systemd-logind[1192]: Session 21 logged out. Waiting for processes to exit. Dec 13 01:49:54.539552 systemd-logind[1192]: Removed session 21. Dec 13 01:49:54.562000 audit[4979]: USER_ACCT pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.564447 sshd[4979]: Accepted publickey for core from 10.0.0.1 port 57720 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:54.563000 audit[4979]: CRED_ACQ pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.563000 audit[4979]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7c438a30 a2=3 a3=0 items=0 ppid=1 pid=4979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:54.565421 sshd[4979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:54.568487 systemd-logind[1192]: New session 22 of user core. Dec 13 01:49:54.569265 systemd[1]: Started session-22.scope. Dec 13 01:49:54.570000 audit[4979]: USER_START pid=4979 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.572000 audit[4982]: CRED_ACQ pid=4982 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.668615 sshd[4979]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:54.667000 audit[4979]: USER_END pid=4979 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.668000 audit[4979]: CRED_DISP pid=4979 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:54.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.22:22-10.0.0.1:57720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:54.670643 systemd[1]: sshd@21-10.0.0.22:22-10.0.0.1:57720.service: Deactivated successfully. Dec 13 01:49:54.671313 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 01:49:54.671801 systemd-logind[1192]: Session 22 logged out. Waiting for processes to exit. Dec 13 01:49:54.672415 systemd-logind[1192]: Removed session 22. Dec 13 01:49:54.696563 systemd[1]: run-containerd-runc-k8s.io-7e02e3d2b35d0c1887b4917735093b9123c8afd583e1e9f2d948a8ea3ada017e-runc.T9sbUH.mount: Deactivated successfully. Dec 13 01:49:54.739906 kubelet[2063]: E1213 01:49:54.739874 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:54.749211 kubelet[2063]: I1213 01:49:54.749180 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-7cxjh" podStartSLOduration=46.870014907 podStartE2EDuration="50.74914045s" podCreationTimestamp="2024-12-13 01:49:04 +0000 UTC" firstStartedPulling="2024-12-13 01:49:49.065928336 +0000 UTC m=+67.412082206" lastFinishedPulling="2024-12-13 01:49:52.945053879 +0000 UTC m=+71.291207749" observedRunningTime="2024-12-13 01:49:53.928578061 +0000 UTC m=+72.274731931" watchObservedRunningTime="2024-12-13 01:49:54.74914045 +0000 UTC m=+73.095294320" Dec 13 01:49:55.007000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:55.007000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00262dfc0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:49:55.007000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:55.007000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:55.007000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011bb0a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:49:55.007000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:55.007000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:55.007000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00262dfe0 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:49:55.007000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:55.008000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:55.008000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c02060 a2=fc6 a3=0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c745,c771 key=(null) Dec 13 01:49:55.008000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:58.742084 kubelet[2063]: E1213 01:49:58.742029 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:49:59.225994 kubelet[2063]: I1213 01:49:59.225950 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:49:59.395000 audit[5026]: NETFILTER_CFG table=filter:120 family=2 entries=33 op=nft_register_rule pid=5026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:59.400765 kernel: kauditd_printk_skb: 112 callbacks suppressed Dec 13 01:49:59.400854 kernel: audit: type=1325 audit(1734054599.395:1494): table=filter:120 family=2 entries=33 op=nft_register_rule pid=5026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:59.400884 kernel: audit: type=1300 audit(1734054599.395:1494): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd85366fa0 a2=0 a3=7ffd85366f8c items=0 ppid=2224 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.395000 audit[5026]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd85366fa0 a2=0 a3=7ffd85366f8c items=0 ppid=2224 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:59.420244 kernel: audit: type=1327 audit(1734054599.395:1494): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:59.420330 kernel: audit: type=1325 audit(1734054599.417:1495): table=nat:121 family=2 entries=27 op=nft_register_chain pid=5026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:59.417000 audit[5026]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=5026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:59.417000 audit[5026]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd85366fa0 a2=0 a3=0 items=0 ppid=2224 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.427100 kernel: audit: type=1300 audit(1734054599.417:1495): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd85366fa0 a2=0 a3=0 items=0 ppid=2224 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.427142 kernel: audit: type=1327 audit(1734054599.417:1495): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:59.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:59.672781 systemd[1]: Started sshd@22-10.0.0.22:22-10.0.0.1:59798.service. Dec 13 01:49:59.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.22:22-10.0.0.1:59798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:59.677541 kernel: audit: type=1130 audit(1734054599.671:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.22:22-10.0.0.1:59798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:59.701000 audit[5028]: USER_ACCT pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:59.702994 sshd[5028]: Accepted publickey for core from 10.0.0.1 port 59798 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:49:59.704944 sshd[5028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:49:59.703000 audit[5028]: CRED_ACQ pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:59.708512 systemd-logind[1192]: New session 23 of user core. Dec 13 01:49:59.709437 systemd[1]: Started session-23.scope. Dec 13 01:49:59.711631 kernel: audit: type=1101 audit(1734054599.701:1497): pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:59.711678 kernel: audit: type=1103 audit(1734054599.703:1498): pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:59.711713 kernel: audit: type=1006 audit(1734054599.703:1499): pid=5028 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 01:49:59.703000 audit[5028]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff905df8b0 a2=3 a3=0 items=0 ppid=1 pid=5028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:49:59.713000 audit[5028]: USER_START pid=5028 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:59.714000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:59.842712 sshd[5028]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:59.842000 audit[5028]: USER_END pid=5028 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:59.842000 audit[5028]: CRED_DISP pid=5028 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:49:59.845125 systemd[1]: sshd@22-10.0.0.22:22-10.0.0.1:59798.service: Deactivated successfully. Dec 13 01:49:59.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.22:22-10.0.0.1:59798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:59.845874 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 01:49:59.846414 systemd-logind[1192]: Session 23 logged out. Waiting for processes to exit. Dec 13 01:49:59.847120 systemd-logind[1192]: Removed session 23. Dec 13 01:50:00.792000 audit[5041]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:00.792000 audit[5041]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc98c68b40 a2=0 a3=7ffc98c68b2c items=0 ppid=2224 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:00.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:00.797000 audit[5041]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=5041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:00.797000 audit[5041]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc98c68b40 a2=0 a3=7ffc98c68b2c items=0 ppid=2224 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:00.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:04.846247 systemd[1]: Started sshd@23-10.0.0.22:22-10.0.0.1:59806.service. Dec 13 01:50:04.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.22:22-10.0.0.1:59806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:50:04.847489 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 01:50:04.847568 kernel: audit: type=1130 audit(1734054604.844:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.22:22-10.0.0.1:59806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:50:04.875000 audit[5046]: USER_ACCT pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:04.877122 sshd[5046]: Accepted publickey for core from 10.0.0.1 port 59806 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:50:04.878997 sshd[5046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:50:04.877000 audit[5046]: CRED_ACQ pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:04.882676 systemd-logind[1192]: New session 24 of user core. Dec 13 01:50:04.883432 systemd[1]: Started session-24.scope. Dec 13 01:50:04.884487 kernel: audit: type=1101 audit(1734054604.875:1508): pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:04.884572 kernel: audit: type=1103 audit(1734054604.877:1509): pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:04.884602 kernel: audit: type=1006 audit(1734054604.877:1510): pid=5046 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 01:50:04.886791 kernel: audit: type=1300 audit(1734054604.877:1510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc10bf3de0 a2=3 a3=0 items=0 ppid=1 pid=5046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:04.877000 audit[5046]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc10bf3de0 a2=3 a3=0 items=0 ppid=1 pid=5046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:04.890744 kernel: audit: type=1327 audit(1734054604.877:1510): proctitle=737368643A20636F7265205B707269765D Dec 13 01:50:04.877000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:50:04.886000 audit[5046]: USER_START pid=5046 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:04.896479 kernel: audit: type=1105 audit(1734054604.886:1511): pid=5046 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:04.896596 kernel: audit: type=1103 audit(1734054604.887:1512): pid=5048 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:04.887000 audit[5048]: CRED_ACQ pid=5048 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:05.008102 sshd[5046]: pam_unix(sshd:session): session closed for user core Dec 13 01:50:05.007000 audit[5046]: USER_END pid=5046 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:05.010155 systemd[1]: sshd@23-10.0.0.22:22-10.0.0.1:59806.service: Deactivated successfully. Dec 13 01:50:05.010923 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 01:50:05.012159 systemd-logind[1192]: Session 24 logged out. Waiting for processes to exit. Dec 13 01:50:05.012897 systemd-logind[1192]: Removed session 24. Dec 13 01:50:05.007000 audit[5046]: CRED_DISP pid=5046 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:05.016743 kernel: audit: type=1106 audit(1734054605.007:1513): pid=5046 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:05.016809 kernel: audit: type=1104 audit(1734054605.007:1514): pid=5046 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:05.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.22:22-10.0.0.1:59806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:50:07.741384 kubelet[2063]: E1213 01:50:07.741354 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:50:10.012072 systemd[1]: Started sshd@24-10.0.0.22:22-10.0.0.1:51260.service. Dec 13 01:50:10.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.22:22-10.0.0.1:51260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:50:10.013116 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:50:10.013163 kernel: audit: type=1130 audit(1734054610.010:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.22:22-10.0.0.1:51260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:50:10.040000 audit[5061]: USER_ACCT pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.042072 sshd[5061]: Accepted publickey for core from 10.0.0.1 port 51260 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:50:10.045111 sshd[5061]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:50:10.043000 audit[5061]: CRED_ACQ pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.050996 kernel: audit: type=1101 audit(1734054610.040:1517): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.051040 kernel: audit: type=1103 audit(1734054610.043:1518): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.051067 kernel: audit: type=1006 audit(1734054610.043:1519): pid=5061 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 01:50:10.049575 systemd-logind[1192]: New session 25 of user core. Dec 13 01:50:10.050325 systemd[1]: Started session-25.scope. Dec 13 01:50:10.043000 audit[5061]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffad35a6a0 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:10.043000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:50:10.058311 kernel: audit: type=1300 audit(1734054610.043:1519): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffad35a6a0 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:10.058346 kernel: audit: type=1327 audit(1734054610.043:1519): proctitle=737368643A20636F7265205B707269765D Dec 13 01:50:10.058368 kernel: audit: type=1105 audit(1734054610.053:1520): pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.053000 audit[5061]: USER_START pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.055000 audit[5063]: CRED_ACQ pid=5063 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.067875 kernel: audit: type=1103 audit(1734054610.055:1521): pid=5063 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.172291 sshd[5061]: pam_unix(sshd:session): session closed for user core Dec 13 01:50:10.171000 audit[5061]: USER_END pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.175317 systemd[1]: sshd@24-10.0.0.22:22-10.0.0.1:51260.service: Deactivated successfully. Dec 13 01:50:10.176023 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 01:50:10.176669 systemd-logind[1192]: Session 25 logged out. Waiting for processes to exit. Dec 13 01:50:10.177573 systemd-logind[1192]: Removed session 25. Dec 13 01:50:10.172000 audit[5061]: CRED_DISP pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.181394 kernel: audit: type=1106 audit(1734054610.171:1522): pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.181463 kernel: audit: type=1104 audit(1734054610.172:1523): pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:10.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.22:22-10.0.0.1:51260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:50:13.617574 kubelet[2063]: I1213 01:50:13.617543 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:50:13.646000 audit[5076]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=5076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:13.646000 audit[5076]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc127b37b0 a2=0 a3=7ffc127b379c items=0 ppid=2224 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:13.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:13.654000 audit[5076]: NETFILTER_CFG table=nat:125 family=2 entries=58 op=nft_register_chain pid=5076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:13.654000 audit[5076]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffc127b37b0 a2=0 a3=7ffc127b379c items=0 ppid=2224 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:13.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:15.176262 systemd[1]: Started sshd@25-10.0.0.22:22-10.0.0.1:51264.service. Dec 13 01:50:15.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.22:22-10.0.0.1:51264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:50:15.177417 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 01:50:15.177479 kernel: audit: type=1130 audit(1734054615.175:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.22:22-10.0.0.1:51264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:50:15.206000 audit[5078]: USER_ACCT pid=5078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.206805 sshd[5078]: Accepted publickey for core from 10.0.0.1 port 51264 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:50:15.210000 audit[5078]: CRED_ACQ pid=5078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.211200 sshd[5078]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:50:15.215218 kernel: audit: type=1101 audit(1734054615.206:1528): pid=5078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.215259 kernel: audit: type=1103 audit(1734054615.210:1529): pid=5078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.215283 kernel: audit: type=1006 audit(1734054615.210:1530): pid=5078 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 01:50:15.214823 systemd-logind[1192]: New session 26 of user core. Dec 13 01:50:15.215857 systemd[1]: Started session-26.scope. Dec 13 01:50:15.210000 audit[5078]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4a2071d0 a2=3 a3=0 items=0 ppid=1 pid=5078 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:15.222367 kernel: audit: type=1300 audit(1734054615.210:1530): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4a2071d0 a2=3 a3=0 items=0 ppid=1 pid=5078 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:15.222426 kernel: audit: type=1327 audit(1734054615.210:1530): proctitle=737368643A20636F7265205B707269765D Dec 13 01:50:15.210000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:50:15.218000 audit[5078]: USER_START pid=5078 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.228006 kernel: audit: type=1105 audit(1734054615.218:1531): pid=5078 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.228056 kernel: audit: type=1103 audit(1734054615.220:1532): pid=5080 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.220000 audit[5080]: CRED_ACQ pid=5080 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.315330 sshd[5078]: pam_unix(sshd:session): session closed for user core Dec 13 01:50:15.315000 audit[5078]: USER_END pid=5078 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.317625 systemd[1]: sshd@25-10.0.0.22:22-10.0.0.1:51264.service: Deactivated successfully. Dec 13 01:50:15.318327 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 01:50:15.315000 audit[5078]: CRED_DISP pid=5078 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.324736 kernel: audit: type=1106 audit(1734054615.315:1533): pid=5078 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.324791 kernel: audit: type=1104 audit(1734054615.315:1534): pid=5078 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:50:15.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.22:22-10.0.0.1:51264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:50:15.324981 systemd-logind[1192]: Session 26 logged out. Waiting for processes to exit. Dec 13 01:50:15.325669 systemd-logind[1192]: Removed session 26. Dec 13 01:50:15.741592 kubelet[2063]: E1213 01:50:15.741561 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"