Dec 13 01:58:48.830644 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 01:58:48.830664 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:58:48.830673 kernel: BIOS-provided physical RAM map: Dec 13 01:58:48.830679 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:58:48.830684 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:58:48.830690 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:58:48.830696 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:58:48.830702 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:58:48.830707 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:58:48.830714 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:58:48.830737 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 01:58:48.830743 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:58:48.830748 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:58:48.830754 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:58:48.830761 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:58:48.830768 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:58:48.830774 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:58:48.830779 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:58:48.830785 kernel: NX (Execute Disable) protection: active Dec 13 01:58:48.830791 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:58:48.830797 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:58:48.830803 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:58:48.830809 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:58:48.830814 kernel: extended physical RAM map: Dec 13 01:58:48.830820 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:58:48.830829 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:58:48.830835 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:58:48.830842 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:58:48.830849 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:58:48.830855 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:58:48.830861 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:58:48.830867 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 01:58:48.830872 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 01:58:48.830878 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 01:58:48.830884 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 01:58:48.830889 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 01:58:48.830896 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:58:48.830902 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:58:48.830908 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:58:48.830914 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:58:48.830922 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:58:48.830929 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:58:48.830935 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:58:48.830942 kernel: efi: EFI v2.70 by EDK II Dec 13 01:58:48.830948 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 01:58:48.830954 kernel: random: crng init done Dec 13 01:58:48.830961 kernel: SMBIOS 2.8 present. Dec 13 01:58:48.830967 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 01:58:48.830973 kernel: Hypervisor detected: KVM Dec 13 01:58:48.830979 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 01:58:48.830986 kernel: kvm-clock: cpu 0, msr 5419b001, primary cpu clock Dec 13 01:58:48.830992 kernel: kvm-clock: using sched offset of 4138881097 cycles Dec 13 01:58:48.831001 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 01:58:48.831007 kernel: tsc: Detected 2794.748 MHz processor Dec 13 01:58:48.831014 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 01:58:48.831021 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 01:58:48.831027 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 01:58:48.831034 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 01:58:48.831040 kernel: Using GB pages for direct mapping Dec 13 01:58:48.831046 kernel: Secure boot disabled Dec 13 01:58:48.831053 kernel: ACPI: Early table checksum verification disabled Dec 13 01:58:48.831060 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 01:58:48.831067 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 01:58:48.831073 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:58:48.831079 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:58:48.831086 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 01:58:48.831092 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:58:48.831099 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:58:48.831105 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:58:48.831111 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:58:48.831119 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 01:58:48.831126 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 01:58:48.831132 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 01:58:48.831138 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 01:58:48.831145 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 01:58:48.831151 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 01:58:48.831157 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 01:58:48.831164 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 01:58:48.831170 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 01:58:48.831178 kernel: No NUMA configuration found Dec 13 01:58:48.831184 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 01:58:48.831191 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 01:58:48.831197 kernel: Zone ranges: Dec 13 01:58:48.831204 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 01:58:48.831210 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 01:58:48.831216 kernel: Normal empty Dec 13 01:58:48.831223 kernel: Movable zone start for each node Dec 13 01:58:48.831229 kernel: Early memory node ranges Dec 13 01:58:48.831236 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 01:58:48.831243 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 01:58:48.831249 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 01:58:48.831255 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 01:58:48.831262 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 01:58:48.831268 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 01:58:48.831274 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 01:58:48.831281 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:58:48.831287 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 01:58:48.831293 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 01:58:48.831301 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:58:48.831307 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 01:58:48.831314 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 01:58:48.831320 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 01:58:48.831326 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 01:58:48.831333 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 01:58:48.831339 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 01:58:48.831345 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 01:58:48.831352 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 01:58:48.831359 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 01:58:48.831366 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 01:58:48.831372 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 01:58:48.831378 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 01:58:48.831385 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 01:58:48.831391 kernel: TSC deadline timer available Dec 13 01:58:48.831397 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 01:58:48.831404 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 01:58:48.831410 kernel: kvm-guest: setup PV sched yield Dec 13 01:58:48.831417 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 01:58:48.831424 kernel: Booting paravirtualized kernel on KVM Dec 13 01:58:48.831435 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 01:58:48.831443 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 01:58:48.831449 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 01:58:48.831456 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 01:58:48.831463 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 01:58:48.831469 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 01:58:48.831476 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 01:58:48.831483 kernel: kvm-guest: PV spinlocks enabled Dec 13 01:58:48.831489 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 01:58:48.831496 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 01:58:48.831504 kernel: Policy zone: DMA32 Dec 13 01:58:48.831512 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:58:48.831519 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 01:58:48.831526 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 01:58:48.831533 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 01:58:48.831540 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 01:58:48.831547 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 169308K reserved, 0K cma-reserved) Dec 13 01:58:48.831554 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 01:58:48.831561 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 01:58:48.831567 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 01:58:48.831574 kernel: rcu: Hierarchical RCU implementation. Dec 13 01:58:48.831582 kernel: rcu: RCU event tracing is enabled. Dec 13 01:58:48.831589 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 01:58:48.831596 kernel: Rude variant of Tasks RCU enabled. Dec 13 01:58:48.831603 kernel: Tracing variant of Tasks RCU enabled. Dec 13 01:58:48.831610 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 01:58:48.831617 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 01:58:48.831623 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 01:58:48.831630 kernel: Console: colour dummy device 80x25 Dec 13 01:58:48.831637 kernel: printk: console [ttyS0] enabled Dec 13 01:58:48.831644 kernel: ACPI: Core revision 20210730 Dec 13 01:58:48.831650 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 01:58:48.831658 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 01:58:48.831665 kernel: x2apic enabled Dec 13 01:58:48.831671 kernel: Switched APIC routing to physical x2apic. Dec 13 01:58:48.831678 kernel: kvm-guest: setup PV IPIs Dec 13 01:58:48.831685 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 01:58:48.831692 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 01:58:48.831698 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 01:58:48.831705 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 01:58:48.831712 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 01:58:48.831737 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 01:58:48.831744 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 01:58:48.831751 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 01:58:48.831758 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 01:58:48.831765 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 01:58:48.831772 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 01:58:48.831778 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 01:58:48.831785 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 01:58:48.831792 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 01:58:48.831800 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 01:58:48.831807 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 01:58:48.831814 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 01:58:48.831822 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 01:58:48.831830 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 01:58:48.831838 kernel: Freeing SMP alternatives memory: 32K Dec 13 01:58:48.831846 kernel: pid_max: default: 32768 minimum: 301 Dec 13 01:58:48.831853 kernel: LSM: Security Framework initializing Dec 13 01:58:48.831860 kernel: SELinux: Initializing. Dec 13 01:58:48.831868 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:58:48.831875 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:58:48.831882 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 01:58:48.831889 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 01:58:48.831895 kernel: ... version: 0 Dec 13 01:58:48.831902 kernel: ... bit width: 48 Dec 13 01:58:48.831909 kernel: ... generic registers: 6 Dec 13 01:58:48.831915 kernel: ... value mask: 0000ffffffffffff Dec 13 01:58:48.831922 kernel: ... max period: 00007fffffffffff Dec 13 01:58:48.831930 kernel: ... fixed-purpose events: 0 Dec 13 01:58:48.831937 kernel: ... event mask: 000000000000003f Dec 13 01:58:48.831944 kernel: signal: max sigframe size: 1776 Dec 13 01:58:48.831950 kernel: rcu: Hierarchical SRCU implementation. Dec 13 01:58:48.831957 kernel: smp: Bringing up secondary CPUs ... Dec 13 01:58:48.831964 kernel: x86: Booting SMP configuration: Dec 13 01:58:48.831971 kernel: .... node #0, CPUs: #1 Dec 13 01:58:48.831977 kernel: kvm-clock: cpu 1, msr 5419b041, secondary cpu clock Dec 13 01:58:48.831984 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 01:58:48.831992 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 01:58:48.831998 kernel: #2 Dec 13 01:58:48.832005 kernel: kvm-clock: cpu 2, msr 5419b081, secondary cpu clock Dec 13 01:58:48.832012 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 01:58:48.832019 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 01:58:48.832025 kernel: #3 Dec 13 01:58:48.832032 kernel: kvm-clock: cpu 3, msr 5419b0c1, secondary cpu clock Dec 13 01:58:48.832038 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 01:58:48.832045 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 01:58:48.832052 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 01:58:48.832060 kernel: smpboot: Max logical packages: 1 Dec 13 01:58:48.832067 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 01:58:48.832073 kernel: devtmpfs: initialized Dec 13 01:58:48.832080 kernel: x86/mm: Memory block size: 128MB Dec 13 01:58:48.832087 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 01:58:48.832094 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 01:58:48.832101 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 01:58:48.832107 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 01:58:48.832114 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 01:58:48.832122 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 01:58:48.832129 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 01:58:48.832136 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 01:58:48.832142 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 01:58:48.832149 kernel: audit: initializing netlink subsys (disabled) Dec 13 01:58:48.832156 kernel: audit: type=2000 audit(1734055128.766:1): state=initialized audit_enabled=0 res=1 Dec 13 01:58:48.832162 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 01:58:48.832169 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 01:58:48.832176 kernel: cpuidle: using governor menu Dec 13 01:58:48.832183 kernel: ACPI: bus type PCI registered Dec 13 01:58:48.832190 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 01:58:48.832197 kernel: dca service started, version 1.12.1 Dec 13 01:58:48.832204 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 01:58:48.832211 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 01:58:48.832217 kernel: PCI: Using configuration type 1 for base access Dec 13 01:58:48.832224 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 01:58:48.832231 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 01:58:48.832238 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 01:58:48.832246 kernel: ACPI: Added _OSI(Module Device) Dec 13 01:58:48.832252 kernel: ACPI: Added _OSI(Processor Device) Dec 13 01:58:48.832259 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 01:58:48.832266 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 01:58:48.832272 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 01:58:48.832279 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 01:58:48.832286 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 01:58:48.832293 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 01:58:48.832299 kernel: ACPI: Interpreter enabled Dec 13 01:58:48.832307 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 01:58:48.832314 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 01:58:48.832321 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 01:58:48.832327 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 01:58:48.832334 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 01:58:48.832456 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 01:58:48.832527 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 01:58:48.832597 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 01:58:48.832606 kernel: PCI host bridge to bus 0000:00 Dec 13 01:58:48.832676 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 01:58:48.832757 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 01:58:48.832869 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 01:58:48.832932 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 01:58:48.832990 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 01:58:48.833052 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 01:58:48.833112 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 01:58:48.833193 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 01:58:48.833270 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 01:58:48.833339 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 01:58:48.833405 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 01:58:48.833470 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 01:58:48.833539 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 01:58:48.833607 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 01:58:48.833683 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 01:58:48.833792 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 01:58:48.833862 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 01:58:48.833929 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 01:58:48.834003 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 01:58:48.834073 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 01:58:48.834140 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 01:58:48.834207 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 01:58:48.834285 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 01:58:48.834370 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 01:58:48.836758 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 01:58:48.837147 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 01:58:48.837257 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 01:58:48.837341 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 01:58:48.837415 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 01:58:48.837494 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 01:58:48.837566 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 01:58:48.837638 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 01:58:48.837742 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 01:58:48.837820 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 01:58:48.837829 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 01:58:48.837837 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 01:58:48.837844 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 01:58:48.837851 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 01:58:48.837858 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 01:58:48.837866 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 01:58:48.837877 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 01:58:48.837884 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 01:58:48.837892 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 01:58:48.837899 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 01:58:48.837906 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 01:58:48.837913 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 01:58:48.837920 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 01:58:48.837927 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 01:58:48.837934 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 01:58:48.837943 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 01:58:48.837950 kernel: iommu: Default domain type: Translated Dec 13 01:58:48.837958 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 01:58:48.838035 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 01:58:48.838109 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 01:58:48.838179 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 01:58:48.838189 kernel: vgaarb: loaded Dec 13 01:58:48.838196 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 01:58:48.838204 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 01:58:48.838214 kernel: PTP clock support registered Dec 13 01:58:48.838222 kernel: Registered efivars operations Dec 13 01:58:48.838229 kernel: PCI: Using ACPI for IRQ routing Dec 13 01:58:48.838236 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 01:58:48.838244 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 01:58:48.838251 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 01:58:48.838258 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 01:58:48.838265 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 01:58:48.838272 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 01:58:48.838281 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 01:58:48.838288 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 01:58:48.838295 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 01:58:48.838302 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 01:58:48.838309 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 01:58:48.838317 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 01:58:48.838324 kernel: pnp: PnP ACPI init Dec 13 01:58:48.838403 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 01:58:48.838417 kernel: pnp: PnP ACPI: found 6 devices Dec 13 01:58:48.838425 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 01:58:48.838432 kernel: NET: Registered PF_INET protocol family Dec 13 01:58:48.838439 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 01:58:48.838446 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 01:58:48.838454 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 01:58:48.838461 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 01:58:48.838468 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 01:58:48.838477 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 01:58:48.838484 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:58:48.838491 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:58:48.838498 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 01:58:48.838505 kernel: NET: Registered PF_XDP protocol family Dec 13 01:58:48.838579 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 01:58:48.838651 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 01:58:48.838749 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 01:58:48.838872 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 01:58:48.838937 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 01:58:48.838997 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 01:58:48.839055 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 01:58:48.839114 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 01:58:48.839123 kernel: PCI: CLS 0 bytes, default 64 Dec 13 01:58:48.839131 kernel: Initialise system trusted keyrings Dec 13 01:58:48.839138 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 01:58:48.839145 kernel: Key type asymmetric registered Dec 13 01:58:48.839155 kernel: Asymmetric key parser 'x509' registered Dec 13 01:58:48.839163 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 01:58:48.839182 kernel: io scheduler mq-deadline registered Dec 13 01:58:48.839192 kernel: io scheduler kyber registered Dec 13 01:58:48.839199 kernel: io scheduler bfq registered Dec 13 01:58:48.839206 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 01:58:48.839214 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 01:58:48.839222 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 01:58:48.839229 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 01:58:48.839238 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 01:58:48.839246 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 01:58:48.839254 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 01:58:48.839261 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 01:58:48.839268 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 01:58:48.839340 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 01:58:48.839351 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 01:58:48.839412 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 01:58:48.839477 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T01:58:48 UTC (1734055128) Dec 13 01:58:48.839539 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 01:58:48.839548 kernel: efifb: probing for efifb Dec 13 01:58:48.839556 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 01:58:48.839563 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 01:58:48.839571 kernel: efifb: scrolling: redraw Dec 13 01:58:48.839578 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 01:58:48.839586 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 01:58:48.839593 kernel: fb0: EFI VGA frame buffer device Dec 13 01:58:48.839603 kernel: pstore: Registered efi as persistent store backend Dec 13 01:58:48.839611 kernel: NET: Registered PF_INET6 protocol family Dec 13 01:58:48.839619 kernel: Segment Routing with IPv6 Dec 13 01:58:48.839628 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 01:58:48.839635 kernel: NET: Registered PF_PACKET protocol family Dec 13 01:58:48.839643 kernel: Key type dns_resolver registered Dec 13 01:58:48.839651 kernel: IPI shorthand broadcast: enabled Dec 13 01:58:48.839659 kernel: sched_clock: Marking stable (416010006, 127698950)->(586274744, -42565788) Dec 13 01:58:48.839666 kernel: registered taskstats version 1 Dec 13 01:58:48.839674 kernel: Loading compiled-in X.509 certificates Dec 13 01:58:48.839682 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 01:58:48.839689 kernel: Key type .fscrypt registered Dec 13 01:58:48.839696 kernel: Key type fscrypt-provisioning registered Dec 13 01:58:48.839704 kernel: pstore: Using crash dump compression: deflate Dec 13 01:58:48.839713 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 01:58:48.839742 kernel: ima: Allocated hash algorithm: sha1 Dec 13 01:58:48.839750 kernel: ima: No architecture policies found Dec 13 01:58:48.839757 kernel: clk: Disabling unused clocks Dec 13 01:58:48.839765 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 01:58:48.839772 kernel: Write protecting the kernel read-only data: 28672k Dec 13 01:58:48.839780 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 01:58:48.839787 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 01:58:48.839794 kernel: Run /init as init process Dec 13 01:58:48.839804 kernel: with arguments: Dec 13 01:58:48.839811 kernel: /init Dec 13 01:58:48.839818 kernel: with environment: Dec 13 01:58:48.839825 kernel: HOME=/ Dec 13 01:58:48.839832 kernel: TERM=linux Dec 13 01:58:48.839839 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 01:58:48.839851 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:58:48.839861 systemd[1]: Detected virtualization kvm. Dec 13 01:58:48.839871 systemd[1]: Detected architecture x86-64. Dec 13 01:58:48.839878 systemd[1]: Running in initrd. Dec 13 01:58:48.839887 systemd[1]: No hostname configured, using default hostname. Dec 13 01:58:48.839896 systemd[1]: Hostname set to . Dec 13 01:58:48.839905 systemd[1]: Initializing machine ID from VM UUID. Dec 13 01:58:48.839915 systemd[1]: Queued start job for default target initrd.target. Dec 13 01:58:48.839922 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:58:48.839930 systemd[1]: Reached target cryptsetup.target. Dec 13 01:58:48.839938 systemd[1]: Reached target paths.target. Dec 13 01:58:48.839947 systemd[1]: Reached target slices.target. Dec 13 01:58:48.839955 systemd[1]: Reached target swap.target. Dec 13 01:58:48.839963 systemd[1]: Reached target timers.target. Dec 13 01:58:48.839971 systemd[1]: Listening on iscsid.socket. Dec 13 01:58:48.839979 systemd[1]: Listening on iscsiuio.socket. Dec 13 01:58:48.839986 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:58:48.839994 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:58:48.840003 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:58:48.840011 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:58:48.840019 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:58:48.840027 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:58:48.840034 systemd[1]: Reached target sockets.target. Dec 13 01:58:48.840042 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:58:48.840050 systemd[1]: Finished network-cleanup.service. Dec 13 01:58:48.840058 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 01:58:48.840065 systemd[1]: Starting systemd-journald.service... Dec 13 01:58:48.840075 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:58:48.840083 systemd[1]: Starting systemd-resolved.service... Dec 13 01:58:48.840090 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 01:58:48.840098 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:58:48.840106 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 01:58:48.840114 kernel: audit: type=1130 audit(1734055128.825:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.840122 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:58:48.840130 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 01:58:48.840138 kernel: audit: type=1130 audit(1734055128.833:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.840150 systemd-journald[197]: Journal started Dec 13 01:58:48.840194 systemd-journald[197]: Runtime Journal (/run/log/journal/833b5f46550d474689b959d36e4520ed) is 6.0M, max 48.4M, 42.4M free. Dec 13 01:58:48.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.838876 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 01:58:48.845217 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 01:58:48.848708 systemd[1]: Started systemd-journald.service. Dec 13 01:58:48.848750 kernel: audit: type=1130 audit(1734055128.847:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.849087 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:58:48.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.855754 kernel: audit: type=1130 audit(1734055128.850:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.854994 systemd-resolved[199]: Positive Trust Anchors: Dec 13 01:58:48.855011 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:58:48.855040 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:58:48.857353 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 01:58:48.858105 systemd[1]: Started systemd-resolved.service. Dec 13 01:58:48.858582 systemd[1]: Reached target nss-lookup.target. Dec 13 01:58:48.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.869750 kernel: audit: type=1130 audit(1734055128.857:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.873751 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 01:58:48.875521 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 01:58:48.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.878115 systemd[1]: Starting dracut-cmdline.service... Dec 13 01:58:48.881425 kernel: audit: type=1130 audit(1734055128.876:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.881445 kernel: Bridge firewalling registered Dec 13 01:58:48.881445 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 01:58:48.885885 dracut-cmdline[217]: dracut-dracut-053 Dec 13 01:58:48.888594 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:58:48.898750 kernel: SCSI subsystem initialized Dec 13 01:58:48.910032 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 01:58:48.910064 kernel: device-mapper: uevent: version 1.0.3 Dec 13 01:58:48.911316 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 01:58:48.914444 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 01:58:48.915225 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:58:48.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.917941 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:58:48.921539 kernel: audit: type=1130 audit(1734055128.916:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.925650 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:58:48.930165 kernel: audit: type=1130 audit(1734055128.925:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:48.953761 kernel: Loading iSCSI transport class v2.0-870. Dec 13 01:58:48.969753 kernel: iscsi: registered transport (tcp) Dec 13 01:58:48.991086 kernel: iscsi: registered transport (qla4xxx) Dec 13 01:58:48.991116 kernel: QLogic iSCSI HBA Driver Dec 13 01:58:49.020464 systemd[1]: Finished dracut-cmdline.service. Dec 13 01:58:49.025570 kernel: audit: type=1130 audit(1734055129.020:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:49.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:49.022162 systemd[1]: Starting dracut-pre-udev.service... Dec 13 01:58:49.066756 kernel: raid6: avx2x4 gen() 30941 MB/s Dec 13 01:58:49.083744 kernel: raid6: avx2x4 xor() 8194 MB/s Dec 13 01:58:49.100743 kernel: raid6: avx2x2 gen() 32438 MB/s Dec 13 01:58:49.117745 kernel: raid6: avx2x2 xor() 19271 MB/s Dec 13 01:58:49.134743 kernel: raid6: avx2x1 gen() 26441 MB/s Dec 13 01:58:49.151739 kernel: raid6: avx2x1 xor() 15340 MB/s Dec 13 01:58:49.168748 kernel: raid6: sse2x4 gen() 14717 MB/s Dec 13 01:58:49.185740 kernel: raid6: sse2x4 xor() 7515 MB/s Dec 13 01:58:49.202744 kernel: raid6: sse2x2 gen() 16305 MB/s Dec 13 01:58:49.219739 kernel: raid6: sse2x2 xor() 9802 MB/s Dec 13 01:58:49.236738 kernel: raid6: sse2x1 gen() 12462 MB/s Dec 13 01:58:49.254147 kernel: raid6: sse2x1 xor() 7468 MB/s Dec 13 01:58:49.254176 kernel: raid6: using algorithm avx2x2 gen() 32438 MB/s Dec 13 01:58:49.254185 kernel: raid6: .... xor() 19271 MB/s, rmw enabled Dec 13 01:58:49.254874 kernel: raid6: using avx2x2 recovery algorithm Dec 13 01:58:49.266739 kernel: xor: automatically using best checksumming function avx Dec 13 01:58:49.358746 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 01:58:49.367878 systemd[1]: Finished dracut-pre-udev.service. Dec 13 01:58:49.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:49.369000 audit: BPF prog-id=7 op=LOAD Dec 13 01:58:49.369000 audit: BPF prog-id=8 op=LOAD Dec 13 01:58:49.370010 systemd[1]: Starting systemd-udevd.service... Dec 13 01:58:49.381738 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 01:58:49.385115 systemd[1]: Started systemd-udevd.service. Dec 13 01:58:49.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:49.386685 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 01:58:49.397085 dracut-pre-trigger[410]: rd.md=0: removing MD RAID activation Dec 13 01:58:49.423145 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 01:58:49.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:49.424827 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:58:49.455634 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:58:49.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:49.488337 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 01:58:49.513340 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 01:58:49.513356 kernel: GPT:9289727 != 19775487 Dec 13 01:58:49.513364 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 01:58:49.513372 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 01:58:49.513386 kernel: GPT:9289727 != 19775487 Dec 13 01:58:49.513394 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 01:58:49.513402 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:58:49.513411 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 01:58:49.513419 kernel: AES CTR mode by8 optimization enabled Dec 13 01:58:49.515744 kernel: libata version 3.00 loaded. Dec 13 01:58:49.525743 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (460) Dec 13 01:58:49.527261 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 01:58:49.529887 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 01:58:49.533382 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 01:58:49.553659 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 01:58:49.553674 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 01:58:49.553790 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 01:58:49.553869 kernel: scsi host0: ahci Dec 13 01:58:49.553958 kernel: scsi host1: ahci Dec 13 01:58:49.554051 kernel: scsi host2: ahci Dec 13 01:58:49.554258 kernel: scsi host3: ahci Dec 13 01:58:49.554345 kernel: scsi host4: ahci Dec 13 01:58:49.554430 kernel: scsi host5: ahci Dec 13 01:58:49.554521 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 01:58:49.554531 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 01:58:49.554540 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 01:58:49.554549 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 01:58:49.554557 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 01:58:49.554566 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 01:58:49.536582 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 01:58:49.546791 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 01:58:49.556874 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:58:49.557789 systemd[1]: Starting disk-uuid.service... Dec 13 01:58:49.564180 disk-uuid[550]: Primary Header is updated. Dec 13 01:58:49.564180 disk-uuid[550]: Secondary Entries is updated. Dec 13 01:58:49.564180 disk-uuid[550]: Secondary Header is updated. Dec 13 01:58:49.567805 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:58:49.570742 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:58:49.863311 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 01:58:49.863393 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 01:58:49.863408 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 01:58:49.863432 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 01:58:49.864749 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 01:58:49.865754 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 01:58:49.867260 kernel: ata3.00: applying bridge limits Dec 13 01:58:49.867279 kernel: ata3.00: configured for UDMA/100 Dec 13 01:58:49.867745 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 01:58:49.867756 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 01:58:49.897749 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 01:58:49.914213 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 01:58:49.914225 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 01:58:50.573669 disk-uuid[551]: The operation has completed successfully. Dec 13 01:58:50.575066 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:58:50.596609 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 01:58:50.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.596734 systemd[1]: Finished disk-uuid.service. Dec 13 01:58:50.610742 systemd[1]: Starting verity-setup.service... Dec 13 01:58:50.624758 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 01:58:50.642863 systemd[1]: Found device dev-mapper-usr.device. Dec 13 01:58:50.645110 systemd[1]: Mounting sysusr-usr.mount... Dec 13 01:58:50.648510 systemd[1]: Finished verity-setup.service. Dec 13 01:58:50.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.703272 systemd[1]: Mounted sysusr-usr.mount. Dec 13 01:58:50.704711 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 01:58:50.704005 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 01:58:50.704695 systemd[1]: Starting ignition-setup.service... Dec 13 01:58:50.705580 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 01:58:50.716867 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:58:50.716907 kernel: BTRFS info (device vda6): using free space tree Dec 13 01:58:50.716921 kernel: BTRFS info (device vda6): has skinny extents Dec 13 01:58:50.724568 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 01:58:50.733815 systemd[1]: Finished ignition-setup.service. Dec 13 01:58:50.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.734767 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 01:58:50.769997 ignition[661]: Ignition 2.14.0 Dec 13 01:58:50.770574 ignition[661]: Stage: fetch-offline Dec 13 01:58:50.770625 ignition[661]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:58:50.770633 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:58:50.770760 ignition[661]: parsed url from cmdline: "" Dec 13 01:58:50.774351 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 01:58:50.770763 ignition[661]: no config URL provided Dec 13 01:58:50.770767 ignition[661]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:58:50.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.776000 audit: BPF prog-id=9 op=LOAD Dec 13 01:58:50.770774 ignition[661]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:58:50.777836 systemd[1]: Starting systemd-networkd.service... Dec 13 01:58:50.770800 ignition[661]: op(1): [started] loading QEMU firmware config module Dec 13 01:58:50.770805 ignition[661]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 01:58:50.775023 ignition[661]: op(1): [finished] loading QEMU firmware config module Dec 13 01:58:50.820027 ignition[661]: parsing config with SHA512: 4fe5d8d63160ffd309a5a8eb8baf5bd6dbfd6a240573e2ece2c94b6d2f4f1d9109776f188329e507e006b124c7819fbdf2b74142bf5af4ec0ca4aa2789343467 Dec 13 01:58:50.825884 unknown[661]: fetched base config from "system" Dec 13 01:58:50.825894 unknown[661]: fetched user config from "qemu" Dec 13 01:58:50.827877 ignition[661]: fetch-offline: fetch-offline passed Dec 13 01:58:50.828714 ignition[661]: Ignition finished successfully Dec 13 01:58:50.830317 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 01:58:50.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.839307 systemd-networkd[731]: lo: Link UP Dec 13 01:58:50.839317 systemd-networkd[731]: lo: Gained carrier Dec 13 01:58:50.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.839701 systemd-networkd[731]: Enumeration completed Dec 13 01:58:50.839796 systemd[1]: Started systemd-networkd.service. Dec 13 01:58:50.839900 systemd-networkd[731]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:58:50.841013 systemd[1]: Reached target network.target. Dec 13 01:58:50.841583 systemd-networkd[731]: eth0: Link UP Dec 13 01:58:50.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.841586 systemd-networkd[731]: eth0: Gained carrier Dec 13 01:58:50.842888 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 01:58:50.852514 ignition[733]: Ignition 2.14.0 Dec 13 01:58:50.843762 systemd[1]: Starting ignition-kargs.service... Dec 13 01:58:50.855577 iscsid[742]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:58:50.855577 iscsid[742]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 01:58:50.855577 iscsid[742]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 01:58:50.855577 iscsid[742]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 01:58:50.855577 iscsid[742]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 01:58:50.855577 iscsid[742]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:58:50.855577 iscsid[742]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 01:58:50.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.852520 ignition[733]: Stage: kargs Dec 13 01:58:50.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.845051 systemd[1]: Starting iscsiuio.service... Dec 13 01:58:50.852597 ignition[733]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:58:50.849040 systemd[1]: Started iscsiuio.service. Dec 13 01:58:50.852605 ignition[733]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:58:50.851742 systemd[1]: Starting iscsid.service... Dec 13 01:58:50.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.853478 ignition[733]: kargs: kargs passed Dec 13 01:58:50.856807 systemd[1]: Started iscsid.service. Dec 13 01:58:50.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.853508 ignition[733]: Ignition finished successfully Dec 13 01:58:50.858289 systemd[1]: Starting dracut-initqueue.service... Dec 13 01:58:50.875290 ignition[750]: Ignition 2.14.0 Dec 13 01:58:50.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.865783 systemd-networkd[731]: eth0: DHCPv4 address 10.0.0.133/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 01:58:50.875296 ignition[750]: Stage: disks Dec 13 01:58:50.867816 systemd[1]: Finished ignition-kargs.service. Dec 13 01:58:50.875376 ignition[750]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:58:50.868871 systemd[1]: Starting ignition-disks.service... Dec 13 01:58:50.875383 ignition[750]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:58:50.874543 systemd[1]: Finished dracut-initqueue.service. Dec 13 01:58:50.876249 ignition[750]: disks: disks passed Dec 13 01:58:50.875751 systemd[1]: Reached target remote-fs-pre.target. Dec 13 01:58:50.876279 ignition[750]: Ignition finished successfully Dec 13 01:58:50.877181 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:58:50.878111 systemd[1]: Reached target remote-fs.target. Dec 13 01:58:50.879559 systemd[1]: Starting dracut-pre-mount.service... Dec 13 01:58:50.880480 systemd[1]: Finished ignition-disks.service. Dec 13 01:58:50.902686 systemd-fsck[764]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 01:58:50.881887 systemd[1]: Reached target initrd-root-device.target. Dec 13 01:58:50.882844 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:58:50.884396 systemd[1]: Reached target local-fs.target. Dec 13 01:58:50.885207 systemd[1]: Reached target sysinit.target. Dec 13 01:58:50.886693 systemd[1]: Reached target basic.target. Dec 13 01:58:50.887666 systemd[1]: Finished dracut-pre-mount.service. Dec 13 01:58:50.889425 systemd[1]: Starting systemd-fsck-root.service... Dec 13 01:58:50.910225 systemd[1]: Finished systemd-fsck-root.service. Dec 13 01:58:50.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.913299 systemd[1]: Mounting sysroot.mount... Dec 13 01:58:50.919738 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 01:58:50.920466 systemd[1]: Mounted sysroot.mount. Dec 13 01:58:50.921827 systemd[1]: Reached target initrd-root-fs.target. Dec 13 01:58:50.923531 systemd[1]: Mounting sysroot-usr.mount... Dec 13 01:58:50.924217 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 01:58:50.924253 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 01:58:50.924274 systemd[1]: Reached target ignition-diskful.target. Dec 13 01:58:50.932023 systemd[1]: Mounted sysroot-usr.mount. Dec 13 01:58:50.933438 systemd[1]: Starting initrd-setup-root.service... Dec 13 01:58:50.938848 initrd-setup-root[774]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 01:58:50.943091 initrd-setup-root[782]: cut: /sysroot/etc/group: No such file or directory Dec 13 01:58:50.946170 initrd-setup-root[790]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 01:58:50.949121 initrd-setup-root[798]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 01:58:50.972295 systemd[1]: Finished initrd-setup-root.service. Dec 13 01:58:50.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.973253 systemd[1]: Starting ignition-mount.service... Dec 13 01:58:50.974796 systemd[1]: Starting sysroot-boot.service... Dec 13 01:58:50.978484 bash[815]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 01:58:50.987397 ignition[817]: INFO : Ignition 2.14.0 Dec 13 01:58:50.987397 ignition[817]: INFO : Stage: mount Dec 13 01:58:50.989064 ignition[817]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:58:50.989064 ignition[817]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:58:50.991979 ignition[817]: INFO : mount: mount passed Dec 13 01:58:50.992255 ignition[817]: INFO : Ignition finished successfully Dec 13 01:58:50.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:50.992181 systemd[1]: Finished sysroot-boot.service. Dec 13 01:58:50.995501 systemd[1]: Finished ignition-mount.service. Dec 13 01:58:50.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:51.653819 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:58:51.660759 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (825) Dec 13 01:58:51.662882 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:58:51.662898 kernel: BTRFS info (device vda6): using free space tree Dec 13 01:58:51.662907 kernel: BTRFS info (device vda6): has skinny extents Dec 13 01:58:51.666421 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:58:51.667889 systemd[1]: Starting ignition-files.service... Dec 13 01:58:51.681300 ignition[845]: INFO : Ignition 2.14.0 Dec 13 01:58:51.681300 ignition[845]: INFO : Stage: files Dec 13 01:58:51.683189 ignition[845]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:58:51.683189 ignition[845]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:58:51.683189 ignition[845]: DEBUG : files: compiled without relabeling support, skipping Dec 13 01:58:51.687469 ignition[845]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 01:58:51.687469 ignition[845]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 01:58:51.687469 ignition[845]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 01:58:51.687469 ignition[845]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 01:58:51.687469 ignition[845]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 01:58:51.687469 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:58:51.687469 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 01:58:51.686506 unknown[845]: wrote ssh authorized keys file for user: core Dec 13 01:58:51.731499 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 01:58:51.816989 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:58:51.816989 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 01:58:51.820752 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 01:58:51.820752 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:58:51.824090 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:58:51.825774 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:58:51.827706 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:58:51.829397 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:58:51.831113 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:58:51.832903 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:58:51.834759 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:58:51.836535 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 01:58:51.836535 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 01:58:51.836535 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 01:58:51.836535 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 01:58:52.308761 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 01:58:52.327369 systemd-networkd[731]: eth0: Gained IPv6LL Dec 13 01:58:52.780572 ignition[845]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 01:58:52.780572 ignition[845]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 01:58:52.785201 ignition[845]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:58:52.785201 ignition[845]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:58:52.785201 ignition[845]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 01:58:52.785201 ignition[845]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 01:58:52.785201 ignition[845]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 01:58:52.795138 ignition[845]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 01:58:52.795138 ignition[845]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 01:58:52.795138 ignition[845]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 01:58:52.795138 ignition[845]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 01:58:52.818813 ignition[845]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 01:58:52.829758 ignition[845]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 01:58:52.829758 ignition[845]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" Dec 13 01:58:52.829758 ignition[845]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 01:58:52.834552 ignition[845]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:58:52.836601 ignition[845]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:58:52.838602 ignition[845]: INFO : files: files passed Dec 13 01:58:52.838602 ignition[845]: INFO : Ignition finished successfully Dec 13 01:58:52.839800 systemd[1]: Finished ignition-files.service. Dec 13 01:58:52.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.840904 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 01:58:52.842549 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 01:58:52.843049 systemd[1]: Starting ignition-quench.service... Dec 13 01:58:52.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.845527 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 01:58:52.845587 systemd[1]: Finished ignition-quench.service. Dec 13 01:58:52.852633 initrd-setup-root-after-ignition[870]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 01:58:52.855467 initrd-setup-root-after-ignition[872]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 01:58:52.857498 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 01:58:52.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.858002 systemd[1]: Reached target ignition-complete.target. Dec 13 01:58:52.861115 systemd[1]: Starting initrd-parse-etc.service... Dec 13 01:58:52.873486 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 01:58:52.873562 systemd[1]: Finished initrd-parse-etc.service. Dec 13 01:58:52.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.890233 systemd[1]: Reached target initrd-fs.target. Dec 13 01:58:52.891706 systemd[1]: Reached target initrd.target. Dec 13 01:58:52.893168 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 01:58:52.893920 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 01:58:52.906304 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 01:58:52.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.907754 systemd[1]: Starting initrd-cleanup.service... Dec 13 01:58:52.918247 systemd[1]: Stopped target nss-lookup.target. Dec 13 01:58:52.918864 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 01:58:52.920211 systemd[1]: Stopped target timers.target. Dec 13 01:58:52.922166 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 01:58:52.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.922303 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 01:58:52.923334 systemd[1]: Stopped target initrd.target. Dec 13 01:58:52.925094 systemd[1]: Stopped target basic.target. Dec 13 01:58:52.925406 systemd[1]: Stopped target ignition-complete.target. Dec 13 01:58:52.927839 systemd[1]: Stopped target ignition-diskful.target. Dec 13 01:58:52.929292 systemd[1]: Stopped target initrd-root-device.target. Dec 13 01:58:52.931057 systemd[1]: Stopped target remote-fs.target. Dec 13 01:58:52.932503 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 01:58:52.935160 systemd[1]: Stopped target sysinit.target. Dec 13 01:58:52.936682 systemd[1]: Stopped target local-fs.target. Dec 13 01:58:52.937265 systemd[1]: Stopped target local-fs-pre.target. Dec 13 01:58:52.939151 systemd[1]: Stopped target swap.target. Dec 13 01:58:52.940879 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 01:58:52.940983 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 01:58:52.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.942401 systemd[1]: Stopped target cryptsetup.target. Dec 13 01:58:52.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.943162 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 01:58:52.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.943269 systemd[1]: Stopped dracut-initqueue.service. Dec 13 01:58:52.945430 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 01:58:52.945556 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 01:58:52.947089 systemd[1]: Stopped target paths.target. Dec 13 01:58:52.948520 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 01:58:52.952989 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 01:58:52.954761 systemd[1]: Stopped target slices.target. Dec 13 01:58:52.955144 systemd[1]: Stopped target sockets.target. Dec 13 01:58:52.956549 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 01:58:52.956656 systemd[1]: Closed iscsid.socket. Dec 13 01:58:52.958172 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 01:58:52.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.958265 systemd[1]: Closed iscsiuio.socket. Dec 13 01:58:52.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.959601 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 01:58:52.959762 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 01:58:52.960864 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 01:58:52.960981 systemd[1]: Stopped ignition-files.service. Dec 13 01:58:52.963526 systemd[1]: Stopping ignition-mount.service... Dec 13 01:58:52.965883 systemd[1]: Stopping sysroot-boot.service... Dec 13 01:58:52.970707 ignition[885]: INFO : Ignition 2.14.0 Dec 13 01:58:52.970707 ignition[885]: INFO : Stage: umount Dec 13 01:58:52.972580 ignition[885]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:58:52.972580 ignition[885]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:58:52.972580 ignition[885]: INFO : umount: umount passed Dec 13 01:58:52.972580 ignition[885]: INFO : Ignition finished successfully Dec 13 01:58:52.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.970882 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 01:58:52.971882 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 01:58:52.977499 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 01:58:52.978600 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 01:58:52.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.985037 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 01:58:52.986540 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 01:58:52.987560 systemd[1]: Stopped ignition-mount.service. Dec 13 01:58:52.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.989404 systemd[1]: Stopped target network.target. Dec 13 01:58:52.990921 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 01:58:52.990960 systemd[1]: Stopped ignition-disks.service. Dec 13 01:58:52.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.993306 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 01:58:52.993335 systemd[1]: Stopped ignition-kargs.service. Dec 13 01:58:52.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.995084 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 01:58:52.995801 systemd[1]: Stopped ignition-setup.service. Dec 13 01:58:52.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:52.998268 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:58:52.999963 systemd[1]: Stopping systemd-resolved.service... Dec 13 01:58:53.001848 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 01:58:53.001940 systemd[1]: Finished initrd-cleanup.service. Dec 13 01:58:53.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.003786 systemd-networkd[731]: eth0: DHCPv6 lease lost Dec 13 01:58:53.005790 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:58:53.006807 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:58:53.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.009577 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 01:58:53.009661 systemd[1]: Stopped systemd-resolved.service. Dec 13 01:58:53.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.012979 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 01:58:53.013016 systemd[1]: Closed systemd-networkd.socket. Dec 13 01:58:53.014000 audit: BPF prog-id=9 op=UNLOAD Dec 13 01:58:53.016141 systemd[1]: Stopping network-cleanup.service... Dec 13 01:58:53.016000 audit: BPF prog-id=6 op=UNLOAD Dec 13 01:58:53.017744 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 01:58:53.017796 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 01:58:53.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.020527 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 01:58:53.020560 systemd[1]: Stopped systemd-sysctl.service. Dec 13 01:58:53.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.023291 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 01:58:53.024283 systemd[1]: Stopped systemd-modules-load.service. Dec 13 01:58:53.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.026079 systemd[1]: Stopping systemd-udevd.service... Dec 13 01:58:53.028201 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 01:58:53.032085 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 01:58:53.033159 systemd[1]: Stopped network-cleanup.service. Dec 13 01:58:53.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.035042 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 01:58:53.036079 systemd[1]: Stopped systemd-udevd.service. Dec 13 01:58:53.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.037994 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 01:58:53.038031 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 01:58:53.040588 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 01:58:53.040625 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 01:58:53.043185 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 01:58:53.043220 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 01:58:53.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.045687 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 01:58:53.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.045716 systemd[1]: Stopped dracut-cmdline.service. Dec 13 01:58:53.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.047426 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 01:58:53.047455 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 01:58:53.051388 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 01:58:53.053118 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 01:58:53.053160 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 01:58:53.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.056090 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 01:58:53.056122 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 01:58:53.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.057911 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 01:58:53.058635 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 01:58:53.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.061990 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 01:58:53.063712 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 01:58:53.064900 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 01:58:53.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.067171 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 01:58:53.068143 systemd[1]: Stopped sysroot-boot.service. Dec 13 01:58:53.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.069651 systemd[1]: Reached target initrd-switch-root.target. Dec 13 01:58:53.071365 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 01:58:53.071399 systemd[1]: Stopped initrd-setup-root.service. Dec 13 01:58:53.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.074374 systemd[1]: Starting initrd-switch-root.service... Dec 13 01:58:53.090039 systemd[1]: Switching root. Dec 13 01:58:53.108446 iscsid[742]: iscsid shutting down. Dec 13 01:58:53.109225 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). Dec 13 01:58:53.109256 systemd-journald[197]: Journal stopped Dec 13 01:58:55.710892 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 01:58:55.710954 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 01:58:55.710971 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 01:58:55.710986 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 01:58:55.711002 kernel: SELinux: policy capability open_perms=1 Dec 13 01:58:55.711016 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 01:58:55.711034 kernel: SELinux: policy capability always_check_network=0 Dec 13 01:58:55.711048 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 01:58:55.711063 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 01:58:55.711076 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 01:58:55.711090 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 01:58:55.711105 systemd[1]: Successfully loaded SELinux policy in 37.089ms. Dec 13 01:58:55.711133 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.839ms. Dec 13 01:58:55.711153 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:58:55.711169 systemd[1]: Detected virtualization kvm. Dec 13 01:58:55.711184 systemd[1]: Detected architecture x86-64. Dec 13 01:58:55.711199 systemd[1]: Detected first boot. Dec 13 01:58:55.711214 systemd[1]: Initializing machine ID from VM UUID. Dec 13 01:58:55.711229 kernel: kauditd_printk_skb: 65 callbacks suppressed Dec 13 01:58:55.711251 kernel: audit: type=1400 audit(1734055133.455:76): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:58:55.711269 kernel: audit: type=1400 audit(1734055133.455:77): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:58:55.711283 kernel: audit: type=1334 audit(1734055133.458:78): prog-id=10 op=LOAD Dec 13 01:58:55.711298 kernel: audit: type=1334 audit(1734055133.458:79): prog-id=10 op=UNLOAD Dec 13 01:58:55.711312 kernel: audit: type=1334 audit(1734055133.462:80): prog-id=11 op=LOAD Dec 13 01:58:55.711325 kernel: audit: type=1334 audit(1734055133.462:81): prog-id=11 op=UNLOAD Dec 13 01:58:55.711338 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 01:58:55.711353 kernel: audit: type=1400 audit(1734055133.490:82): avc: denied { associate } for pid=918 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:58:55.711369 kernel: audit: type=1300 audit(1734055133.490:82): arch=c000003e syscall=188 success=yes exit=0 a0=c0001078e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=901 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:58:55.711387 kernel: audit: type=1327 audit(1734055133.490:82): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:58:55.711407 kernel: audit: type=1400 audit(1734055133.492:83): avc: denied { associate } for pid=918 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:58:55.711422 systemd[1]: Populated /etc with preset unit settings. Dec 13 01:58:55.711438 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:58:55.711453 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:58:55.711469 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:58:55.711486 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 01:58:55.711501 systemd[1]: Stopped iscsiuio.service. Dec 13 01:58:55.711516 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 01:58:55.711534 systemd[1]: Stopped iscsid.service. Dec 13 01:58:55.711561 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 01:58:55.711579 systemd[1]: Stopped initrd-switch-root.service. Dec 13 01:58:55.711593 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 01:58:55.711609 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 01:58:55.711623 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 01:58:55.711637 systemd[1]: Created slice system-getty.slice. Dec 13 01:58:55.711653 systemd[1]: Created slice system-modprobe.slice. Dec 13 01:58:55.711668 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 01:58:55.711685 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 01:58:55.711701 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 01:58:55.711728 systemd[1]: Created slice user.slice. Dec 13 01:58:55.711746 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:58:55.711762 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 01:58:55.711776 systemd[1]: Set up automount boot.automount. Dec 13 01:58:55.711791 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 01:58:55.711807 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 01:58:55.711821 systemd[1]: Stopped target initrd-fs.target. Dec 13 01:58:55.711839 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 01:58:55.711854 systemd[1]: Reached target integritysetup.target. Dec 13 01:58:55.711868 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:58:55.711884 systemd[1]: Reached target remote-fs.target. Dec 13 01:58:55.711899 systemd[1]: Reached target slices.target. Dec 13 01:58:55.711914 systemd[1]: Reached target swap.target. Dec 13 01:58:55.711929 systemd[1]: Reached target torcx.target. Dec 13 01:58:55.711944 systemd[1]: Reached target veritysetup.target. Dec 13 01:58:55.711958 systemd[1]: Listening on systemd-coredump.socket. Dec 13 01:58:55.711974 systemd[1]: Listening on systemd-initctl.socket. Dec 13 01:58:55.711992 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:58:55.712008 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:58:55.712023 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:58:55.712037 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 01:58:55.712053 systemd[1]: Mounting dev-hugepages.mount... Dec 13 01:58:55.712068 systemd[1]: Mounting dev-mqueue.mount... Dec 13 01:58:55.712083 systemd[1]: Mounting media.mount... Dec 13 01:58:55.712098 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:55.712112 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 01:58:55.712130 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 01:58:55.712145 systemd[1]: Mounting tmp.mount... Dec 13 01:58:55.712159 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 01:58:55.712174 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:58:55.712189 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:58:55.712203 systemd[1]: Starting modprobe@configfs.service... Dec 13 01:58:55.712219 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:58:55.712247 systemd[1]: Starting modprobe@drm.service... Dec 13 01:58:55.712262 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:58:55.712280 systemd[1]: Starting modprobe@fuse.service... Dec 13 01:58:55.712296 systemd[1]: Starting modprobe@loop.service... Dec 13 01:58:55.712311 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 01:58:55.712326 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 01:58:55.712340 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 01:58:55.712355 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 01:58:55.712369 kernel: fuse: init (API version 7.34) Dec 13 01:58:55.712384 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 01:58:55.712398 kernel: loop: module loaded Dec 13 01:58:55.712415 systemd[1]: Stopped systemd-journald.service. Dec 13 01:58:55.712431 systemd[1]: Starting systemd-journald.service... Dec 13 01:58:55.712445 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:58:55.712459 systemd[1]: Starting systemd-network-generator.service... Dec 13 01:58:55.712474 systemd[1]: Starting systemd-remount-fs.service... Dec 13 01:58:55.712489 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:58:55.712503 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 01:58:55.712518 systemd[1]: Stopped verity-setup.service. Dec 13 01:58:55.712534 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:55.712569 systemd-journald[1003]: Journal started Dec 13 01:58:55.712619 systemd-journald[1003]: Runtime Journal (/run/log/journal/833b5f46550d474689b959d36e4520ed) is 6.0M, max 48.4M, 42.4M free. Dec 13 01:58:53.165000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:58:53.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:58:53.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:58:53.458000 audit: BPF prog-id=10 op=LOAD Dec 13 01:58:53.458000 audit: BPF prog-id=10 op=UNLOAD Dec 13 01:58:53.462000 audit: BPF prog-id=11 op=LOAD Dec 13 01:58:53.462000 audit: BPF prog-id=11 op=UNLOAD Dec 13 01:58:53.490000 audit[918]: AVC avc: denied { associate } for pid=918 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:58:53.490000 audit[918]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=901 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:58:53.490000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:58:53.492000 audit[918]: AVC avc: denied { associate } for pid=918 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:58:53.492000 audit[918]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079b9 a2=1ed a3=0 items=2 ppid=901 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:58:53.492000 audit: CWD cwd="/" Dec 13 01:58:53.492000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:53.492000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:53.492000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:58:55.577000 audit: BPF prog-id=12 op=LOAD Dec 13 01:58:55.577000 audit: BPF prog-id=3 op=UNLOAD Dec 13 01:58:55.577000 audit: BPF prog-id=13 op=LOAD Dec 13 01:58:55.577000 audit: BPF prog-id=14 op=LOAD Dec 13 01:58:55.577000 audit: BPF prog-id=4 op=UNLOAD Dec 13 01:58:55.577000 audit: BPF prog-id=5 op=UNLOAD Dec 13 01:58:55.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.593000 audit: BPF prog-id=12 op=UNLOAD Dec 13 01:58:55.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.693000 audit: BPF prog-id=15 op=LOAD Dec 13 01:58:55.693000 audit: BPF prog-id=16 op=LOAD Dec 13 01:58:55.693000 audit: BPF prog-id=17 op=LOAD Dec 13 01:58:55.693000 audit: BPF prog-id=13 op=UNLOAD Dec 13 01:58:55.693000 audit: BPF prog-id=14 op=UNLOAD Dec 13 01:58:55.709000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 01:58:55.709000 audit[1003]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffc15d8560 a2=4000 a3=7fffc15d85fc items=0 ppid=1 pid=1003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:58:55.709000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 01:58:55.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.575677 systemd[1]: Queued start job for default target multi-user.target. Dec 13 01:58:53.489251 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:58:55.575695 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 01:58:53.489463 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:58:55.579595 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 01:58:53.489485 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:58:53.489515 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 01:58:53.489526 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 01:58:53.489559 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 01:58:53.489574 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 01:58:53.489841 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 01:58:53.489891 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:58:55.715242 systemd[1]: Started systemd-journald.service. Dec 13 01:58:53.489905 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:58:55.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:53.490530 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 01:58:53.490570 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 01:58:55.715616 systemd[1]: Mounted dev-hugepages.mount. Dec 13 01:58:53.490591 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 01:58:53.490616 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 01:58:53.490636 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 01:58:53.490652 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 01:58:55.286565 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:55Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:58:55.287126 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:55Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:58:55.287225 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:55Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:58:55.287362 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:55Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:58:55.287407 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:55Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 01:58:55.287456 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2024-12-13T01:58:55Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 01:58:55.716604 systemd[1]: Mounted dev-mqueue.mount. Dec 13 01:58:55.717429 systemd[1]: Mounted media.mount. Dec 13 01:58:55.718198 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 01:58:55.719107 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 01:58:55.720011 systemd[1]: Mounted tmp.mount. Dec 13 01:58:55.720882 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 01:58:55.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.721945 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:58:55.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.723000 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 01:58:55.723120 systemd[1]: Finished modprobe@configfs.service. Dec 13 01:58:55.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.724168 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:58:55.724331 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:58:55.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.725407 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:58:55.725513 systemd[1]: Finished modprobe@drm.service. Dec 13 01:58:55.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.726558 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:58:55.726728 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:58:55.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.727973 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 01:58:55.728077 systemd[1]: Finished modprobe@fuse.service. Dec 13 01:58:55.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.729094 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:58:55.729219 systemd[1]: Finished modprobe@loop.service. Dec 13 01:58:55.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.730282 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:58:55.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.731517 systemd[1]: Finished systemd-network-generator.service. Dec 13 01:58:55.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.732741 systemd[1]: Finished systemd-remount-fs.service. Dec 13 01:58:55.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.733973 systemd[1]: Reached target network-pre.target. Dec 13 01:58:55.735833 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 01:58:55.737484 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 01:58:55.738287 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 01:58:55.739366 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 01:58:55.741114 systemd[1]: Starting systemd-journal-flush.service... Dec 13 01:58:55.742308 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:58:55.743158 systemd[1]: Starting systemd-random-seed.service... Dec 13 01:58:55.744136 systemd-journald[1003]: Time spent on flushing to /var/log/journal/833b5f46550d474689b959d36e4520ed is 24.685ms for 1156 entries. Dec 13 01:58:55.744136 systemd-journald[1003]: System Journal (/var/log/journal/833b5f46550d474689b959d36e4520ed) is 8.0M, max 195.6M, 187.6M free. Dec 13 01:58:55.841947 systemd-journald[1003]: Received client request to flush runtime journal. Dec 13 01:58:55.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:55.745484 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:58:55.746218 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:58:55.747655 systemd[1]: Starting systemd-sysusers.service... Dec 13 01:58:55.750630 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 01:58:55.842696 udevadm[1021]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 01:58:55.753494 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 01:58:55.755496 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:58:55.757387 systemd[1]: Starting systemd-udev-settle.service... Dec 13 01:58:55.766405 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:58:55.771629 systemd[1]: Finished systemd-random-seed.service. Dec 13 01:58:55.772898 systemd[1]: Reached target first-boot-complete.target. Dec 13 01:58:55.775344 systemd[1]: Finished systemd-sysusers.service. Dec 13 01:58:55.777243 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:58:55.794093 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:58:55.843033 systemd[1]: Finished systemd-journal-flush.service. Dec 13 01:58:55.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.236478 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 01:58:56.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.237000 audit: BPF prog-id=18 op=LOAD Dec 13 01:58:56.237000 audit: BPF prog-id=19 op=LOAD Dec 13 01:58:56.237000 audit: BPF prog-id=7 op=UNLOAD Dec 13 01:58:56.237000 audit: BPF prog-id=8 op=UNLOAD Dec 13 01:58:56.238608 systemd[1]: Starting systemd-udevd.service... Dec 13 01:58:56.253931 systemd-udevd[1026]: Using default interface naming scheme 'v252'. Dec 13 01:58:56.265636 systemd[1]: Started systemd-udevd.service. Dec 13 01:58:56.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.267000 audit: BPF prog-id=20 op=LOAD Dec 13 01:58:56.273000 audit: BPF prog-id=21 op=LOAD Dec 13 01:58:56.273000 audit: BPF prog-id=22 op=LOAD Dec 13 01:58:56.273000 audit: BPF prog-id=23 op=LOAD Dec 13 01:58:56.269187 systemd[1]: Starting systemd-networkd.service... Dec 13 01:58:56.275264 systemd[1]: Starting systemd-userdbd.service... Dec 13 01:58:56.287225 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 01:58:56.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.304286 systemd[1]: Started systemd-userdbd.service. Dec 13 01:58:56.322766 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 01:58:56.335816 kernel: ACPI: button: Power Button [PWRF] Dec 13 01:58:56.326000 audit[1033]: AVC avc: denied { confidentiality } for pid=1033 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:58:56.355512 systemd-networkd[1037]: lo: Link UP Dec 13 01:58:56.355533 systemd-networkd[1037]: lo: Gained carrier Dec 13 01:58:56.355914 systemd-networkd[1037]: Enumeration completed Dec 13 01:58:56.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.356009 systemd-networkd[1037]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:58:56.356011 systemd[1]: Started systemd-networkd.service. Dec 13 01:58:56.357188 systemd-networkd[1037]: eth0: Link UP Dec 13 01:58:56.357191 systemd-networkd[1037]: eth0: Gained carrier Dec 13 01:58:56.363103 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:58:56.367872 systemd-networkd[1037]: eth0: DHCPv4 address 10.0.0.133/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 01:58:56.377743 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 01:58:56.326000 audit[1033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558284174a90 a1=337fc a2=7f20c9fc8bc5 a3=5 items=110 ppid=1026 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:58:56.326000 audit: CWD cwd="/" Dec 13 01:58:56.326000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=1 name=(null) inode=13666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=2 name=(null) inode=13666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=3 name=(null) inode=13667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=4 name=(null) inode=13666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=5 name=(null) inode=13668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=6 name=(null) inode=13666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=7 name=(null) inode=13669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=8 name=(null) inode=13669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=9 name=(null) inode=13670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=10 name=(null) inode=13669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=11 name=(null) inode=13671 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=12 name=(null) inode=13669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=13 name=(null) inode=13672 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=14 name=(null) inode=13669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=15 name=(null) inode=13673 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=16 name=(null) inode=13669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=17 name=(null) inode=13674 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=18 name=(null) inode=13666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=19 name=(null) inode=13675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=20 name=(null) inode=13675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=21 name=(null) inode=13676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=22 name=(null) inode=13675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=23 name=(null) inode=13677 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=24 name=(null) inode=13675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=25 name=(null) inode=13678 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=26 name=(null) inode=13675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=27 name=(null) inode=13679 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=28 name=(null) inode=13675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=29 name=(null) inode=13680 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=30 name=(null) inode=13666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=31 name=(null) inode=13681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=32 name=(null) inode=13681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=33 name=(null) inode=13682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=34 name=(null) inode=13681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=35 name=(null) inode=13683 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=36 name=(null) inode=13681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=37 name=(null) inode=13684 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=38 name=(null) inode=13681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=39 name=(null) inode=13685 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=40 name=(null) inode=13681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=41 name=(null) inode=13686 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=42 name=(null) inode=13666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=43 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=44 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=45 name=(null) inode=13688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=46 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=47 name=(null) inode=13689 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=48 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=49 name=(null) inode=13690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=50 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=51 name=(null) inode=13691 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=52 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=53 name=(null) inode=13692 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=55 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=56 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=57 name=(null) inode=13694 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=58 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=59 name=(null) inode=13695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=60 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=61 name=(null) inode=13696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=62 name=(null) inode=13696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=63 name=(null) inode=13697 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=64 name=(null) inode=13696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=65 name=(null) inode=13698 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=66 name=(null) inode=13696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=67 name=(null) inode=13699 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=68 name=(null) inode=13696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=69 name=(null) inode=13700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=70 name=(null) inode=13696 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=71 name=(null) inode=13701 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=72 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=73 name=(null) inode=13702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=74 name=(null) inode=13702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=75 name=(null) inode=13703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=76 name=(null) inode=13702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=77 name=(null) inode=13704 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=78 name=(null) inode=13702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=79 name=(null) inode=13705 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=80 name=(null) inode=13702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=81 name=(null) inode=13706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=82 name=(null) inode=13702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=83 name=(null) inode=13707 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=84 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=85 name=(null) inode=13708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=86 name=(null) inode=13708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=87 name=(null) inode=13709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=88 name=(null) inode=13708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=89 name=(null) inode=13710 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=90 name=(null) inode=13708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=91 name=(null) inode=13711 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=92 name=(null) inode=13708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=93 name=(null) inode=13712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=94 name=(null) inode=13708 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=95 name=(null) inode=13713 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=96 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=97 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=98 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=99 name=(null) inode=13715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=100 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=101 name=(null) inode=13716 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=102 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=103 name=(null) inode=13717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=104 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=105 name=(null) inode=13718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=106 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=107 name=(null) inode=13719 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PATH item=109 name=(null) inode=16533 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:58:56.326000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 01:58:56.385744 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 01:58:56.389410 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 01:58:56.391956 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 01:58:56.392125 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 01:58:56.392268 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 01:58:56.440822 kernel: kvm: Nested Virtualization enabled Dec 13 01:58:56.440928 kernel: SVM: kvm: Nested Paging enabled Dec 13 01:58:56.440971 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 01:58:56.442008 kernel: SVM: Virtual GIF supported Dec 13 01:58:56.459745 kernel: EDAC MC: Ver: 3.0.0 Dec 13 01:58:56.483301 systemd[1]: Finished systemd-udev-settle.service. Dec 13 01:58:56.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.485536 systemd[1]: Starting lvm2-activation-early.service... Dec 13 01:58:56.498317 lvm[1062]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:58:56.520602 systemd[1]: Finished lvm2-activation-early.service. Dec 13 01:58:56.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.521738 systemd[1]: Reached target cryptsetup.target. Dec 13 01:58:56.523642 systemd[1]: Starting lvm2-activation.service... Dec 13 01:58:56.527046 lvm[1063]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:58:56.550626 systemd[1]: Finished lvm2-activation.service. Dec 13 01:58:56.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.551641 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:58:56.552527 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 01:58:56.552548 systemd[1]: Reached target local-fs.target. Dec 13 01:58:56.553359 systemd[1]: Reached target machines.target. Dec 13 01:58:56.555203 systemd[1]: Starting ldconfig.service... Dec 13 01:58:56.556193 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:58:56.556237 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:58:56.557042 systemd[1]: Starting systemd-boot-update.service... Dec 13 01:58:56.558788 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 01:58:56.560725 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 01:58:56.562582 systemd[1]: Starting systemd-sysext.service... Dec 13 01:58:56.563639 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1065 (bootctl) Dec 13 01:58:56.564830 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 01:58:56.568859 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 01:58:56.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.572739 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 01:58:56.577180 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 01:58:56.577567 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 01:58:56.587762 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 01:58:56.603357 systemd-fsck[1073]: fsck.fat 4.2 (2021-01-31) Dec 13 01:58:56.603357 systemd-fsck[1073]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 01:58:56.605119 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 01:58:56.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.608229 systemd[1]: Mounting boot.mount... Dec 13 01:58:56.622907 systemd[1]: Mounted boot.mount. Dec 13 01:58:56.802763 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 01:58:56.802741 systemd[1]: Finished systemd-boot-update.service. Dec 13 01:58:56.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.826751 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 01:58:56.854071 (sd-sysext)[1078]: Using extensions 'kubernetes'. Dec 13 01:58:56.854439 (sd-sysext)[1078]: Merged extensions into '/usr'. Dec 13 01:58:56.890217 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:56.891736 systemd[1]: Mounting usr-share-oem.mount... Dec 13 01:58:56.892884 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:58:56.894228 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:58:56.895937 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:58:56.896236 ldconfig[1064]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 01:58:56.897689 systemd[1]: Starting modprobe@loop.service... Dec 13 01:58:56.898455 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:58:56.898574 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:58:56.898676 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:56.901003 systemd[1]: Mounted usr-share-oem.mount. Dec 13 01:58:56.902052 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:58:56.902158 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:58:56.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.903293 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:58:56.903388 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:58:56.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.904552 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:58:56.904641 systemd[1]: Finished modprobe@loop.service. Dec 13 01:58:56.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.905813 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:58:56.905901 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:58:56.906826 systemd[1]: Finished systemd-sysext.service. Dec 13 01:58:56.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:56.908542 systemd[1]: Starting ensure-sysext.service... Dec 13 01:58:56.910110 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 01:58:56.915582 systemd[1]: Reloading. Dec 13 01:58:56.919980 systemd-tmpfiles[1085]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 01:58:56.956747 /usr/lib/systemd/system-generators/torcx-generator[1104]: time="2024-12-13T01:58:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:58:56.956777 /usr/lib/systemd/system-generators/torcx-generator[1104]: time="2024-12-13T01:58:56Z" level=info msg="torcx already run" Dec 13 01:58:56.964750 systemd-tmpfiles[1085]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 01:58:56.966114 systemd-tmpfiles[1085]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 01:58:57.026709 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:58:57.026741 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:58:57.045263 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:58:57.095000 audit: BPF prog-id=24 op=LOAD Dec 13 01:58:57.095000 audit: BPF prog-id=25 op=LOAD Dec 13 01:58:57.095000 audit: BPF prog-id=18 op=UNLOAD Dec 13 01:58:57.095000 audit: BPF prog-id=19 op=UNLOAD Dec 13 01:58:57.096000 audit: BPF prog-id=26 op=LOAD Dec 13 01:58:57.096000 audit: BPF prog-id=15 op=UNLOAD Dec 13 01:58:57.096000 audit: BPF prog-id=27 op=LOAD Dec 13 01:58:57.096000 audit: BPF prog-id=28 op=LOAD Dec 13 01:58:57.096000 audit: BPF prog-id=16 op=UNLOAD Dec 13 01:58:57.096000 audit: BPF prog-id=17 op=UNLOAD Dec 13 01:58:57.097000 audit: BPF prog-id=29 op=LOAD Dec 13 01:58:57.097000 audit: BPF prog-id=21 op=UNLOAD Dec 13 01:58:57.097000 audit: BPF prog-id=30 op=LOAD Dec 13 01:58:57.097000 audit: BPF prog-id=31 op=LOAD Dec 13 01:58:57.097000 audit: BPF prog-id=22 op=UNLOAD Dec 13 01:58:57.097000 audit: BPF prog-id=23 op=UNLOAD Dec 13 01:58:57.098000 audit: BPF prog-id=32 op=LOAD Dec 13 01:58:57.098000 audit: BPF prog-id=20 op=UNLOAD Dec 13 01:58:57.101253 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 01:58:57.102305 systemd[1]: Finished ldconfig.service. Dec 13 01:58:57.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.103376 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 01:58:57.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.105388 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 01:58:57.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.108886 systemd[1]: Starting audit-rules.service... Dec 13 01:58:57.110521 systemd[1]: Starting clean-ca-certificates.service... Dec 13 01:58:57.112398 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 01:58:57.113000 audit: BPF prog-id=33 op=LOAD Dec 13 01:58:57.114968 systemd[1]: Starting systemd-resolved.service... Dec 13 01:58:57.115000 audit: BPF prog-id=34 op=LOAD Dec 13 01:58:57.117160 systemd[1]: Starting systemd-timesyncd.service... Dec 13 01:58:57.118890 systemd[1]: Starting systemd-update-utmp.service... Dec 13 01:58:57.120194 systemd[1]: Finished clean-ca-certificates.service. Dec 13 01:58:57.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.122000 audit[1159]: SYSTEM_BOOT pid=1159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.124491 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:58:57.126619 systemd[1]: Finished systemd-update-utmp.service. Dec 13 01:58:57.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.128552 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:57.128803 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.130037 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:58:57.131899 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:58:57.133656 systemd[1]: Starting modprobe@loop.service... Dec 13 01:58:57.134521 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.134663 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:58:57.134770 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:58:57.134839 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:57.135833 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 01:58:57.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.137169 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:58:57.137264 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:58:57.138418 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:58:57.138521 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:58:57.139776 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:58:57.139868 systemd[1]: Finished modprobe@loop.service. Dec 13 01:58:57.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.141136 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:58:57.141232 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.142343 systemd[1]: Starting systemd-update-done.service... Dec 13 01:58:57.144577 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:57.144753 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.145959 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:58:57.147823 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:58:57.149610 systemd[1]: Starting modprobe@loop.service... Dec 13 01:58:57.150400 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.150510 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:58:57.150601 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:58:57.150662 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:57.151451 systemd[1]: Finished systemd-update-done.service. Dec 13 01:58:57.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.152916 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:58:57.153019 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:58:57.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.154293 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:58:57.154392 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:58:57.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.155756 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:58:57.155854 systemd[1]: Finished modprobe@loop.service. Dec 13 01:58:57.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:58:57.156000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:58:57.156000 audit[1175]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcadfcae70 a2=420 a3=0 items=0 ppid=1147 pid=1175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:58:57.156000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 01:58:57.157233 augenrules[1175]: No rules Dec 13 01:58:57.157097 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:58:57.157177 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.157527 systemd[1]: Finished audit-rules.service. Dec 13 01:58:57.160471 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:57.160667 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.161785 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:58:57.163595 systemd[1]: Starting modprobe@drm.service... Dec 13 01:58:57.165216 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:58:57.166980 systemd[1]: Starting modprobe@loop.service... Dec 13 01:58:57.167864 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.167964 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:58:57.169100 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:58:57.170243 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:58:57.170356 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:58:57.171484 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:58:57.171619 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:58:57.172934 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:58:57.173034 systemd[1]: Finished modprobe@drm.service. Dec 13 01:58:57.174139 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:58:57.174242 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:58:57.175458 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:58:57.175570 systemd[1]: Finished modprobe@loop.service. Dec 13 01:58:57.176980 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:58:57.177068 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.178249 systemd[1]: Finished ensure-sysext.service. Dec 13 01:58:57.186838 systemd[1]: Started systemd-timesyncd.service. Dec 13 01:58:57.187836 systemd[1]: Reached target time-set.target. Dec 13 01:58:57.922240 systemd-timesyncd[1155]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 01:58:57.922615 systemd-timesyncd[1155]: Initial clock synchronization to Fri 2024-12-13 01:58:57.922155 UTC. Dec 13 01:58:57.924660 systemd-resolved[1153]: Positive Trust Anchors: Dec 13 01:58:57.924672 systemd-resolved[1153]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:58:57.924699 systemd-resolved[1153]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:58:57.930874 systemd-resolved[1153]: Defaulting to hostname 'linux'. Dec 13 01:58:57.932278 systemd[1]: Started systemd-resolved.service. Dec 13 01:58:57.933198 systemd[1]: Reached target network.target. Dec 13 01:58:57.934001 systemd[1]: Reached target nss-lookup.target. Dec 13 01:58:57.934825 systemd[1]: Reached target sysinit.target. Dec 13 01:58:57.935674 systemd[1]: Started motdgen.path. Dec 13 01:58:57.936434 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 01:58:57.937684 systemd[1]: Started logrotate.timer. Dec 13 01:58:57.938500 systemd[1]: Started mdadm.timer. Dec 13 01:58:57.939214 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 01:58:57.940094 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 01:58:57.940118 systemd[1]: Reached target paths.target. Dec 13 01:58:57.940880 systemd[1]: Reached target timers.target. Dec 13 01:58:57.941945 systemd[1]: Listening on dbus.socket. Dec 13 01:58:57.943562 systemd[1]: Starting docker.socket... Dec 13 01:58:57.946561 systemd[1]: Listening on sshd.socket. Dec 13 01:58:57.947427 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:58:57.947749 systemd[1]: Listening on docker.socket. Dec 13 01:58:57.948585 systemd[1]: Reached target sockets.target. Dec 13 01:58:57.949428 systemd[1]: Reached target basic.target. Dec 13 01:58:57.950276 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.950300 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:58:57.951078 systemd[1]: Starting containerd.service... Dec 13 01:58:57.952692 systemd[1]: Starting dbus.service... Dec 13 01:58:57.954205 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 01:58:57.955864 systemd[1]: Starting extend-filesystems.service... Dec 13 01:58:57.957997 jq[1190]: false Dec 13 01:58:57.957265 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 01:58:57.958165 systemd[1]: Starting motdgen.service... Dec 13 01:58:57.962690 systemd[1]: Starting prepare-helm.service... Dec 13 01:58:57.964651 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 01:58:57.965768 extend-filesystems[1191]: Found loop1 Dec 13 01:58:57.965768 extend-filesystems[1191]: Found sr0 Dec 13 01:58:57.972747 extend-filesystems[1191]: Found vda Dec 13 01:58:57.972747 extend-filesystems[1191]: Found vda1 Dec 13 01:58:57.972747 extend-filesystems[1191]: Found vda2 Dec 13 01:58:57.972747 extend-filesystems[1191]: Found vda3 Dec 13 01:58:57.972747 extend-filesystems[1191]: Found usr Dec 13 01:58:57.972747 extend-filesystems[1191]: Found vda4 Dec 13 01:58:57.972747 extend-filesystems[1191]: Found vda6 Dec 13 01:58:57.972747 extend-filesystems[1191]: Found vda7 Dec 13 01:58:57.972747 extend-filesystems[1191]: Found vda9 Dec 13 01:58:57.972747 extend-filesystems[1191]: Checking size of /dev/vda9 Dec 13 01:58:58.005578 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 01:58:57.971694 dbus-daemon[1189]: [system] SELinux support is enabled Dec 13 01:58:57.967657 systemd[1]: Starting sshd-keygen.service... Dec 13 01:58:58.005897 extend-filesystems[1191]: Resized partition /dev/vda9 Dec 13 01:58:57.975994 systemd[1]: Starting systemd-logind.service... Dec 13 01:58:58.007102 extend-filesystems[1212]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 01:58:57.987549 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:58:57.987607 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 01:58:57.989696 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 01:58:57.990331 systemd[1]: Starting update-engine.service... Dec 13 01:58:58.007111 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 01:58:58.009310 systemd[1]: Started dbus.service. Dec 13 01:58:58.010031 jq[1215]: true Dec 13 01:58:58.014418 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 01:58:58.041840 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 01:58:58.014567 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 01:58:58.014805 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 01:58:58.014927 systemd[1]: Finished motdgen.service. Dec 13 01:58:58.043794 jq[1218]: true Dec 13 01:58:58.016450 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 01:58:58.044622 extend-filesystems[1212]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 01:58:58.044622 extend-filesystems[1212]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 01:58:58.044622 extend-filesystems[1212]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 01:58:58.053403 env[1219]: time="2024-12-13T01:58:58.053056781Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 01:58:58.016571 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 01:58:58.055267 extend-filesystems[1191]: Resized filesystem in /dev/vda9 Dec 13 01:58:58.059595 update_engine[1214]: I1213 01:58:58.052927 1214 main.cc:92] Flatcar Update Engine starting Dec 13 01:58:58.059595 update_engine[1214]: I1213 01:58:58.054594 1214 update_check_scheduler.cc:74] Next update check in 8m27s Dec 13 01:58:58.059766 tar[1217]: linux-amd64/helm Dec 13 01:58:58.028240 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 01:58:58.028257 systemd[1]: Reached target system-config.target. Dec 13 01:58:58.029402 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 01:58:58.029414 systemd[1]: Reached target user-config.target. Dec 13 01:58:58.042003 systemd-logind[1206]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 01:58:58.042022 systemd-logind[1206]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 01:58:58.043441 systemd-logind[1206]: New seat seat0. Dec 13 01:58:58.044103 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 01:58:58.044336 systemd[1]: Finished extend-filesystems.service. Dec 13 01:58:58.049361 systemd[1]: Started systemd-logind.service. Dec 13 01:58:58.054544 systemd[1]: Started update-engine.service. Dec 13 01:58:58.057330 systemd[1]: Started locksmithd.service. Dec 13 01:58:58.060926 bash[1241]: Updated "/home/core/.ssh/authorized_keys" Dec 13 01:58:58.063549 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 01:58:58.076316 env[1219]: time="2024-12-13T01:58:58.076290691Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 01:58:58.076508 env[1219]: time="2024-12-13T01:58:58.076490887Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:58:58.077687 env[1219]: time="2024-12-13T01:58:58.077663927Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:58:58.077776 env[1219]: time="2024-12-13T01:58:58.077757553Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:58:58.078026 env[1219]: time="2024-12-13T01:58:58.078007021Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:58:58.078098 env[1219]: time="2024-12-13T01:58:58.078080529Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 01:58:58.078176 env[1219]: time="2024-12-13T01:58:58.078156381Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 01:58:58.078246 env[1219]: time="2024-12-13T01:58:58.078227274Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 01:58:58.078384 env[1219]: time="2024-12-13T01:58:58.078367246Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:58:58.078636 env[1219]: time="2024-12-13T01:58:58.078619550Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:58:58.078821 env[1219]: time="2024-12-13T01:58:58.078802312Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:58:58.078907 env[1219]: time="2024-12-13T01:58:58.078889386Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 01:58:58.079028 env[1219]: time="2024-12-13T01:58:58.079010383Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 01:58:58.079107 env[1219]: time="2024-12-13T01:58:58.079090273Z" level=info msg="metadata content store policy set" policy=shared Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.083913940Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.083974203Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.083987619Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084023997Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084036330Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084048282Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084058992Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084071506Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084082647Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084094529Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084108305Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084120237Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084194457Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 01:58:58.084445 env[1219]: time="2024-12-13T01:58:58.084253577Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084522422Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084580501Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084594878Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084645943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084657776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084669708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084681340Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084693683Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084705175Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084726 env[1219]: time="2024-12-13T01:58:58.084728358Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084909 env[1219]: time="2024-12-13T01:58:58.084740491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084909 env[1219]: time="2024-12-13T01:58:58.084756270Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 01:58:58.084972 env[1219]: time="2024-12-13T01:58:58.084919917Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.084972 env[1219]: time="2024-12-13T01:58:58.084963739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.085013 env[1219]: time="2024-12-13T01:58:58.084976824Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.085013 env[1219]: time="2024-12-13T01:58:58.084989418Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 01:58:58.085052 env[1219]: time="2024-12-13T01:58:58.085003264Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 01:58:58.085052 env[1219]: time="2024-12-13T01:58:58.085023782Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 01:58:58.085052 env[1219]: time="2024-12-13T01:58:58.085042407Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 01:58:58.085107 env[1219]: time="2024-12-13T01:58:58.085077383Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 01:58:58.085317 env[1219]: time="2024-12-13T01:58:58.085250477Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 01:58:58.085317 env[1219]: time="2024-12-13T01:58:58.085317303Z" level=info msg="Connect containerd service" Dec 13 01:58:58.085862 env[1219]: time="2024-12-13T01:58:58.085353370Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 01:58:58.085888 env[1219]: time="2024-12-13T01:58:58.085868126Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:58:58.086204 env[1219]: time="2024-12-13T01:58:58.086097276Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 01:58:58.086204 env[1219]: time="2024-12-13T01:58:58.086129717Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 01:58:58.086204 env[1219]: time="2024-12-13T01:58:58.086172697Z" level=info msg="containerd successfully booted in 0.046611s" Dec 13 01:58:58.086274 systemd[1]: Started containerd.service. Dec 13 01:58:58.091217 env[1219]: time="2024-12-13T01:58:58.091185329Z" level=info msg="Start subscribing containerd event" Dec 13 01:58:58.091267 env[1219]: time="2024-12-13T01:58:58.091244490Z" level=info msg="Start recovering state" Dec 13 01:58:58.091343 env[1219]: time="2024-12-13T01:58:58.091318169Z" level=info msg="Start event monitor" Dec 13 01:58:58.091343 env[1219]: time="2024-12-13T01:58:58.091340200Z" level=info msg="Start snapshots syncer" Dec 13 01:58:58.091408 env[1219]: time="2024-12-13T01:58:58.091348656Z" level=info msg="Start cni network conf syncer for default" Dec 13 01:58:58.091408 env[1219]: time="2024-12-13T01:58:58.091359787Z" level=info msg="Start streaming server" Dec 13 01:58:58.095921 locksmithd[1245]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 01:58:58.245113 systemd-networkd[1037]: eth0: Gained IPv6LL Dec 13 01:58:58.247515 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:58:58.248838 systemd[1]: Reached target network-online.target. Dec 13 01:58:58.251046 systemd[1]: Starting kubelet.service... Dec 13 01:58:58.417405 tar[1217]: linux-amd64/LICENSE Dec 13 01:58:58.417405 tar[1217]: linux-amd64/README.md Dec 13 01:58:58.421264 systemd[1]: Finished prepare-helm.service. Dec 13 01:58:58.510649 sshd_keygen[1213]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 01:58:58.530512 systemd[1]: Finished sshd-keygen.service. Dec 13 01:58:58.532793 systemd[1]: Starting issuegen.service... Dec 13 01:58:58.537672 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 01:58:58.537807 systemd[1]: Finished issuegen.service. Dec 13 01:58:58.539665 systemd[1]: Starting systemd-user-sessions.service... Dec 13 01:58:58.545449 systemd[1]: Finished systemd-user-sessions.service. Dec 13 01:58:58.547628 systemd[1]: Started getty@tty1.service. Dec 13 01:58:58.549384 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 01:58:58.550444 systemd[1]: Reached target getty.target. Dec 13 01:58:58.806838 systemd[1]: Started kubelet.service. Dec 13 01:58:58.808147 systemd[1]: Reached target multi-user.target. Dec 13 01:58:58.810073 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 01:58:58.816853 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 01:58:58.816990 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 01:58:58.818109 systemd[1]: Startup finished in 589ms (kernel) + 4.434s (initrd) + 4.956s (userspace) = 9.981s. Dec 13 01:58:59.244236 kubelet[1270]: E1213 01:58:59.244134 1270 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:58:59.246011 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:58:59.246116 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:59:07.587582 systemd[1]: Created slice system-sshd.slice. Dec 13 01:59:07.588530 systemd[1]: Started sshd@0-10.0.0.133:22-10.0.0.1:42500.service. Dec 13 01:59:07.623385 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 42500 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:59:07.624685 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:59:07.633121 systemd-logind[1206]: New session 1 of user core. Dec 13 01:59:07.634081 systemd[1]: Created slice user-500.slice. Dec 13 01:59:07.635097 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 01:59:07.642322 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 01:59:07.643607 systemd[1]: Starting user@500.service... Dec 13 01:59:07.645831 (systemd)[1283]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:59:07.711317 systemd[1283]: Queued start job for default target default.target. Dec 13 01:59:07.711732 systemd[1283]: Reached target paths.target. Dec 13 01:59:07.711759 systemd[1283]: Reached target sockets.target. Dec 13 01:59:07.711774 systemd[1283]: Reached target timers.target. Dec 13 01:59:07.711788 systemd[1283]: Reached target basic.target. Dec 13 01:59:07.711835 systemd[1283]: Reached target default.target. Dec 13 01:59:07.711867 systemd[1283]: Startup finished in 60ms. Dec 13 01:59:07.711989 systemd[1]: Started user@500.service. Dec 13 01:59:07.712922 systemd[1]: Started session-1.scope. Dec 13 01:59:07.764180 systemd[1]: Started sshd@1-10.0.0.133:22-10.0.0.1:42514.service. Dec 13 01:59:07.797068 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 42514 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:59:07.798514 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:59:07.802562 systemd-logind[1206]: New session 2 of user core. Dec 13 01:59:07.803552 systemd[1]: Started session-2.scope. Dec 13 01:59:07.858026 sshd[1292]: pam_unix(sshd:session): session closed for user core Dec 13 01:59:07.861205 systemd[1]: sshd@1-10.0.0.133:22-10.0.0.1:42514.service: Deactivated successfully. Dec 13 01:59:07.861842 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 01:59:07.862397 systemd-logind[1206]: Session 2 logged out. Waiting for processes to exit. Dec 13 01:59:07.863610 systemd[1]: Started sshd@2-10.0.0.133:22-10.0.0.1:42530.service. Dec 13 01:59:07.864319 systemd-logind[1206]: Removed session 2. Dec 13 01:59:07.897217 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 42530 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:59:07.898548 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:59:07.901946 systemd-logind[1206]: New session 3 of user core. Dec 13 01:59:07.902997 systemd[1]: Started session-3.scope. Dec 13 01:59:07.951546 sshd[1298]: pam_unix(sshd:session): session closed for user core Dec 13 01:59:07.954133 systemd[1]: sshd@2-10.0.0.133:22-10.0.0.1:42530.service: Deactivated successfully. Dec 13 01:59:07.954642 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 01:59:07.955127 systemd-logind[1206]: Session 3 logged out. Waiting for processes to exit. Dec 13 01:59:07.956134 systemd[1]: Started sshd@3-10.0.0.133:22-10.0.0.1:42542.service. Dec 13 01:59:07.956740 systemd-logind[1206]: Removed session 3. Dec 13 01:59:07.987907 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 42542 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:59:07.989206 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:59:07.992560 systemd-logind[1206]: New session 4 of user core. Dec 13 01:59:07.993314 systemd[1]: Started session-4.scope. Dec 13 01:59:08.045671 sshd[1304]: pam_unix(sshd:session): session closed for user core Dec 13 01:59:08.048263 systemd[1]: sshd@3-10.0.0.133:22-10.0.0.1:42542.service: Deactivated successfully. Dec 13 01:59:08.048725 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 01:59:08.049400 systemd-logind[1206]: Session 4 logged out. Waiting for processes to exit. Dec 13 01:59:08.050313 systemd[1]: Started sshd@4-10.0.0.133:22-10.0.0.1:42544.service. Dec 13 01:59:08.051128 systemd-logind[1206]: Removed session 4. Dec 13 01:59:08.084269 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 42544 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:59:08.085542 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:59:08.088835 systemd-logind[1206]: New session 5 of user core. Dec 13 01:59:08.089503 systemd[1]: Started session-5.scope. Dec 13 01:59:08.144216 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 01:59:08.144468 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:59:08.153164 dbus-daemon[1189]: \xd0]0\xdb\u0017V: received setenforce notice (enforcing=1015957952) Dec 13 01:59:08.155182 sudo[1313]: pam_unix(sudo:session): session closed for user root Dec 13 01:59:08.156897 sshd[1310]: pam_unix(sshd:session): session closed for user core Dec 13 01:59:08.159688 systemd[1]: sshd@4-10.0.0.133:22-10.0.0.1:42544.service: Deactivated successfully. Dec 13 01:59:08.160232 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 01:59:08.160768 systemd-logind[1206]: Session 5 logged out. Waiting for processes to exit. Dec 13 01:59:08.161637 systemd[1]: Started sshd@5-10.0.0.133:22-10.0.0.1:42560.service. Dec 13 01:59:08.162399 systemd-logind[1206]: Removed session 5. Dec 13 01:59:08.195895 sshd[1317]: Accepted publickey for core from 10.0.0.1 port 42560 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:59:08.197213 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:59:08.200507 systemd-logind[1206]: New session 6 of user core. Dec 13 01:59:08.201398 systemd[1]: Started session-6.scope. Dec 13 01:59:08.253398 sudo[1321]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 01:59:08.253596 sudo[1321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:59:08.255905 sudo[1321]: pam_unix(sudo:session): session closed for user root Dec 13 01:59:08.259802 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 01:59:08.260006 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:59:08.268119 systemd[1]: Stopping audit-rules.service... Dec 13 01:59:08.268000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:59:08.269409 auditctl[1324]: No rules Dec 13 01:59:08.269668 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 01:59:08.269829 systemd[1]: Stopped audit-rules.service. Dec 13 01:59:08.270113 kernel: kauditd_printk_skb: 236 callbacks suppressed Dec 13 01:59:08.270157 kernel: audit: type=1305 audit(1734055148.268:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:59:08.271246 systemd[1]: Starting audit-rules.service... Dec 13 01:59:08.268000 audit[1324]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffff2bf9c30 a2=420 a3=0 items=0 ppid=1 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.276388 kernel: audit: type=1300 audit(1734055148.268:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffff2bf9c30 a2=420 a3=0 items=0 ppid=1 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.276471 kernel: audit: type=1327 audit(1734055148.268:198): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:59:08.268000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:59:08.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.280683 kernel: audit: type=1131 audit(1734055148.268:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.287876 augenrules[1341]: No rules Dec 13 01:59:08.288566 systemd[1]: Finished audit-rules.service. Dec 13 01:59:08.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.289383 sudo[1320]: pam_unix(sudo:session): session closed for user root Dec 13 01:59:08.290616 sshd[1317]: pam_unix(sshd:session): session closed for user core Dec 13 01:59:08.288000 audit[1320]: USER_END pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.293236 systemd[1]: sshd@5-10.0.0.133:22-10.0.0.1:42560.service: Deactivated successfully. Dec 13 01:59:08.293708 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 01:59:08.294214 systemd-logind[1206]: Session 6 logged out. Waiting for processes to exit. Dec 13 01:59:08.295017 systemd[1]: Started sshd@6-10.0.0.133:22-10.0.0.1:42566.service. Dec 13 01:59:08.295786 systemd-logind[1206]: Removed session 6. Dec 13 01:59:08.296818 kernel: audit: type=1130 audit(1734055148.287:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.296852 kernel: audit: type=1106 audit(1734055148.288:201): pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.288000 audit[1320]: CRED_DISP pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.300754 kernel: audit: type=1104 audit(1734055148.288:202): pid=1320 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.300804 kernel: audit: type=1106 audit(1734055148.290:203): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:08.290000 audit[1317]: USER_END pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:08.290000 audit[1317]: CRED_DISP pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:08.309302 kernel: audit: type=1104 audit(1734055148.290:204): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:08.640021 kernel: audit: type=1131 audit(1734055148.292:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.133:22-10.0.0.1:42560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.133:22-10.0.0.1:42560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.133:22-10.0.0.1:42566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.329000 audit[1347]: USER_ACCT pid=1347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:08.330000 audit[1347]: CRED_ACQ pid=1347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:08.330000 audit[1347]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef019bef0 a2=3 a3=0 items=0 ppid=1 pid=1347 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.330000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:59:08.337000 audit[1347]: USER_START pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:08.339000 audit[1349]: CRED_ACQ pid=1349 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:08.386000 audit[1350]: USER_ACCT pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.386000 audit[1350]: CRED_REFR pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.387000 audit[1350]: USER_START pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.640767 sshd[1347]: Accepted publickey for core from 10.0.0.1 port 42566 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:59:08.334553 systemd-logind[1206]: New session 7 of user core. Dec 13 01:59:08.331487 sshd[1347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:59:08.335185 systemd[1]: Started session-7.scope. Dec 13 01:59:08.387115 sudo[1350]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 01:59:08.387297 sudo[1350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:59:08.654728 systemd[1]: Starting docker.service... Dec 13 01:59:08.687883 env[1361]: time="2024-12-13T01:59:08.687831449Z" level=info msg="Starting up" Dec 13 01:59:08.689068 env[1361]: time="2024-12-13T01:59:08.689041699Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:59:08.689068 env[1361]: time="2024-12-13T01:59:08.689057809Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:59:08.689143 env[1361]: time="2024-12-13T01:59:08.689076424Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:59:08.689143 env[1361]: time="2024-12-13T01:59:08.689085651Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:59:08.690428 env[1361]: time="2024-12-13T01:59:08.690377735Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:59:08.690428 env[1361]: time="2024-12-13T01:59:08.690403403Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:59:08.690428 env[1361]: time="2024-12-13T01:59:08.690430143Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:59:08.690600 env[1361]: time="2024-12-13T01:59:08.690438970Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:59:08.719782 env[1361]: time="2024-12-13T01:59:08.719736183Z" level=info msg="Loading containers: start." Dec 13 01:59:08.768000 audit[1396]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.768000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffeb4ba280 a2=0 a3=7fffeb4ba26c items=0 ppid=1361 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 01:59:08.769000 audit[1398]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.769000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc898fe210 a2=0 a3=7ffc898fe1fc items=0 ppid=1361 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.769000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 01:59:08.771000 audit[1400]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.771000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd8a677f10 a2=0 a3=7ffd8a677efc items=0 ppid=1361 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:59:08.772000 audit[1402]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.772000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffed5c26460 a2=0 a3=7ffed5c2644c items=0 ppid=1361 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.772000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:59:08.774000 audit[1404]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.774000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe31ede8f0 a2=0 a3=7ffe31ede8dc items=0 ppid=1361 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.774000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 01:59:08.788000 audit[1409]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.788000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffebe98ee90 a2=0 a3=7ffebe98ee7c items=0 ppid=1361 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 01:59:08.796000 audit[1411]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.796000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc0d300700 a2=0 a3=7ffc0d3006ec items=0 ppid=1361 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.796000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 01:59:08.798000 audit[1413]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.798000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffeeed29310 a2=0 a3=7ffeeed292fc items=0 ppid=1361 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.798000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 01:59:08.799000 audit[1415]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.799000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc949becd0 a2=0 a3=7ffc949becbc items=0 ppid=1361 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:59:08.807000 audit[1419]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.807000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffca945e7d0 a2=0 a3=7ffca945e7bc items=0 ppid=1361 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.807000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:59:08.814000 audit[1420]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.814000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffda7ba0440 a2=0 a3=7ffda7ba042c items=0 ppid=1361 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.814000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:59:08.822962 kernel: Initializing XFRM netlink socket Dec 13 01:59:08.848578 env[1361]: time="2024-12-13T01:59:08.848539311Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 01:59:08.862000 audit[1428]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.862000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc53ad8660 a2=0 a3=7ffc53ad864c items=0 ppid=1361 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.862000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 01:59:08.874000 audit[1431]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.874000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffefb274ca0 a2=0 a3=7ffefb274c8c items=0 ppid=1361 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.874000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 01:59:08.876000 audit[1434]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.876000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff2d350ab0 a2=0 a3=7fff2d350a9c items=0 ppid=1361 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 01:59:08.878000 audit[1436]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.878000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffedbb5600 a2=0 a3=7fffedbb55ec items=0 ppid=1361 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.878000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 01:59:08.879000 audit[1438]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.879000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff18573770 a2=0 a3=7fff1857375c items=0 ppid=1361 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 01:59:08.881000 audit[1440]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.881000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd4492e490 a2=0 a3=7ffd4492e47c items=0 ppid=1361 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.881000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 01:59:08.883000 audit[1442]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.883000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffda8285be0 a2=0 a3=7ffda8285bcc items=0 ppid=1361 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 01:59:08.889000 audit[1445]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.889000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff01f02660 a2=0 a3=7fff01f0264c items=0 ppid=1361 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.889000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 01:59:08.891000 audit[1447]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.891000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc302dfcf0 a2=0 a3=7ffc302dfcdc items=0 ppid=1361 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.891000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:59:08.892000 audit[1449]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.892000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe2d4dc7a0 a2=0 a3=7ffe2d4dc78c items=0 ppid=1361 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.892000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:59:08.894000 audit[1451]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.894000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffee2e22910 a2=0 a3=7ffee2e228fc items=0 ppid=1361 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.894000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 01:59:08.895389 systemd-networkd[1037]: docker0: Link UP Dec 13 01:59:08.902000 audit[1455]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.902000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff75dc6780 a2=0 a3=7fff75dc676c items=0 ppid=1361 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.902000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:59:08.909000 audit[1456]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:08.909000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff15af52b0 a2=0 a3=7fff15af529c items=0 ppid=1361 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:08.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:59:08.911096 env[1361]: time="2024-12-13T01:59:08.911061595Z" level=info msg="Loading containers: done." Dec 13 01:59:08.926358 env[1361]: time="2024-12-13T01:59:08.926314675Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 01:59:08.926516 env[1361]: time="2024-12-13T01:59:08.926490966Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 01:59:08.926591 env[1361]: time="2024-12-13T01:59:08.926571076Z" level=info msg="Daemon has completed initialization" Dec 13 01:59:08.958288 systemd[1]: Started docker.service. Dec 13 01:59:08.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:08.962956 env[1361]: time="2024-12-13T01:59:08.962881805Z" level=info msg="API listen on /run/docker.sock" Dec 13 01:59:09.256602 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 01:59:09.256799 systemd[1]: Stopped kubelet.service. Dec 13 01:59:09.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:09.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:09.258074 systemd[1]: Starting kubelet.service... Dec 13 01:59:09.329930 systemd[1]: Started kubelet.service. Dec 13 01:59:09.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:09.370419 kubelet[1496]: E1213 01:59:09.370369 1496 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:59:09.372842 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:59:09.372974 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:59:09.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:59:09.645630 env[1219]: time="2024-12-13T01:59:09.645579981Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 01:59:10.616238 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3468106255.mount: Deactivated successfully. Dec 13 01:59:12.134024 env[1219]: time="2024-12-13T01:59:12.133969529Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:12.135606 env[1219]: time="2024-12-13T01:59:12.135583817Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:12.137311 env[1219]: time="2024-12-13T01:59:12.137266884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:12.138888 env[1219]: time="2024-12-13T01:59:12.138854702Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:12.139598 env[1219]: time="2024-12-13T01:59:12.139568280Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 01:59:12.147645 env[1219]: time="2024-12-13T01:59:12.147613962Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 01:59:14.202586 env[1219]: time="2024-12-13T01:59:14.202536088Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:14.205219 env[1219]: time="2024-12-13T01:59:14.205196669Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:14.206713 env[1219]: time="2024-12-13T01:59:14.206692404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:14.208220 env[1219]: time="2024-12-13T01:59:14.208182179Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:14.208793 env[1219]: time="2024-12-13T01:59:14.208763319Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 01:59:14.216604 env[1219]: time="2024-12-13T01:59:14.216578217Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 01:59:15.828867 env[1219]: time="2024-12-13T01:59:15.828802720Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:15.832157 env[1219]: time="2024-12-13T01:59:15.832116385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:15.833807 env[1219]: time="2024-12-13T01:59:15.833771440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:15.835776 env[1219]: time="2024-12-13T01:59:15.835736215Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:15.836466 env[1219]: time="2024-12-13T01:59:15.836440125Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 01:59:15.844576 env[1219]: time="2024-12-13T01:59:15.844538095Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 01:59:17.030284 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1871036096.mount: Deactivated successfully. Dec 13 01:59:17.568387 env[1219]: time="2024-12-13T01:59:17.568334995Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:17.570121 env[1219]: time="2024-12-13T01:59:17.570063126Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:17.571334 env[1219]: time="2024-12-13T01:59:17.571309564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:17.572640 env[1219]: time="2024-12-13T01:59:17.572605255Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:17.573091 env[1219]: time="2024-12-13T01:59:17.573060198Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 01:59:17.581484 env[1219]: time="2024-12-13T01:59:17.581449574Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 01:59:18.155669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4099843995.mount: Deactivated successfully. Dec 13 01:59:19.504019 env[1219]: time="2024-12-13T01:59:19.503930048Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:19.505819 env[1219]: time="2024-12-13T01:59:19.505779477Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:19.507565 env[1219]: time="2024-12-13T01:59:19.507530281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:19.510778 env[1219]: time="2024-12-13T01:59:19.510732738Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:19.511746 env[1219]: time="2024-12-13T01:59:19.511691827Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 01:59:19.519915 env[1219]: time="2024-12-13T01:59:19.519884334Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 01:59:19.622851 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 01:59:19.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:19.623039 systemd[1]: Stopped kubelet.service. Dec 13 01:59:19.624172 systemd[1]: Starting kubelet.service... Dec 13 01:59:19.627268 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 01:59:19.627319 kernel: audit: type=1130 audit(1734055159.622:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:19.627341 kernel: audit: type=1131 audit(1734055159.622:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:19.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:19.694537 systemd[1]: Started kubelet.service. Dec 13 01:59:19.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:19.697976 kernel: audit: type=1130 audit(1734055159.693:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:19.777372 kernel: audit: type=1131 audit(1734055159.761:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:59:19.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:59:19.777594 kubelet[1551]: E1213 01:59:19.760732 1551 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:59:19.762389 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:59:19.762532 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:59:20.349882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3178592156.mount: Deactivated successfully. Dec 13 01:59:20.355765 env[1219]: time="2024-12-13T01:59:20.355733037Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:20.357565 env[1219]: time="2024-12-13T01:59:20.357536600Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:20.358929 env[1219]: time="2024-12-13T01:59:20.358892123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:20.360458 env[1219]: time="2024-12-13T01:59:20.360433514Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:20.360881 env[1219]: time="2024-12-13T01:59:20.360862569Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 01:59:20.370126 env[1219]: time="2024-12-13T01:59:20.370082633Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 01:59:20.888540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4217984095.mount: Deactivated successfully. Dec 13 01:59:24.588013 env[1219]: time="2024-12-13T01:59:24.587949034Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:24.589749 env[1219]: time="2024-12-13T01:59:24.589704267Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:24.591524 env[1219]: time="2024-12-13T01:59:24.591489616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:24.593026 env[1219]: time="2024-12-13T01:59:24.592993907Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:24.593724 env[1219]: time="2024-12-13T01:59:24.593678341Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 01:59:26.756105 systemd[1]: Stopped kubelet.service. Dec 13 01:59:26.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:26.757733 systemd[1]: Starting kubelet.service... Dec 13 01:59:26.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:26.763388 kernel: audit: type=1130 audit(1734055166.755:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:26.763471 kernel: audit: type=1131 audit(1734055166.755:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:26.773748 systemd[1]: Reloading. Dec 13 01:59:26.816991 /usr/lib/systemd/system-generators/torcx-generator[1668]: time="2024-12-13T01:59:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:59:26.817295 /usr/lib/systemd/system-generators/torcx-generator[1668]: time="2024-12-13T01:59:26Z" level=info msg="torcx already run" Dec 13 01:59:27.018278 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:59:27.018292 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:59:27.034955 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:59:27.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.097428 kernel: audit: type=1400 audit(1734055167.089:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.097473 kernel: audit: type=1400 audit(1734055167.089:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.097491 kernel: audit: type=1400 audit(1734055167.089:252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.104553 kernel: audit: type=1400 audit(1734055167.089:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.104602 kernel: audit: type=1400 audit(1734055167.089:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.111738 kernel: audit: type=1400 audit(1734055167.089:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.111779 kernel: audit: type=1400 audit(1734055167.089:256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.115387 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 01:59:27.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.092000 audit: BPF prog-id=40 op=LOAD Dec 13 01:59:27.092000 audit: BPF prog-id=33 op=UNLOAD Dec 13 01:59:27.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.096000 audit: BPF prog-id=41 op=LOAD Dec 13 01:59:27.096000 audit: BPF prog-id=34 op=UNLOAD Dec 13 01:59:27.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.100000 audit: BPF prog-id=42 op=LOAD Dec 13 01:59:27.100000 audit: BPF prog-id=35 op=UNLOAD Dec 13 01:59:27.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.103000 audit: BPF prog-id=43 op=LOAD Dec 13 01:59:27.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.107000 audit: BPF prog-id=44 op=LOAD Dec 13 01:59:27.107000 audit: BPF prog-id=36 op=UNLOAD Dec 13 01:59:27.107000 audit: BPF prog-id=37 op=UNLOAD Dec 13 01:59:27.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.110000 audit: BPF prog-id=45 op=LOAD Dec 13 01:59:27.110000 audit: BPF prog-id=38 op=UNLOAD Dec 13 01:59:27.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit: BPF prog-id=46 op=LOAD Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.116000 audit: BPF prog-id=47 op=LOAD Dec 13 01:59:27.116000 audit: BPF prog-id=24 op=UNLOAD Dec 13 01:59:27.116000 audit: BPF prog-id=25 op=UNLOAD Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit: BPF prog-id=48 op=LOAD Dec 13 01:59:27.117000 audit: BPF prog-id=26 op=UNLOAD Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit: BPF prog-id=49 op=LOAD Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.117000 audit: BPF prog-id=50 op=LOAD Dec 13 01:59:27.117000 audit: BPF prog-id=27 op=UNLOAD Dec 13 01:59:27.117000 audit: BPF prog-id=28 op=UNLOAD Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit: BPF prog-id=51 op=LOAD Dec 13 01:59:27.118000 audit: BPF prog-id=29 op=UNLOAD Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit: BPF prog-id=52 op=LOAD Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.118000 audit: BPF prog-id=53 op=LOAD Dec 13 01:59:27.118000 audit: BPF prog-id=30 op=UNLOAD Dec 13 01:59:27.118000 audit: BPF prog-id=31 op=UNLOAD Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.119000 audit: BPF prog-id=54 op=LOAD Dec 13 01:59:27.119000 audit: BPF prog-id=32 op=UNLOAD Dec 13 01:59:27.128059 systemd[1]: Started kubelet.service. Dec 13 01:59:27.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:27.131765 systemd[1]: Stopping kubelet.service... Dec 13 01:59:27.132196 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:59:27.132337 systemd[1]: Stopped kubelet.service. Dec 13 01:59:27.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:27.133628 systemd[1]: Starting kubelet.service... Dec 13 01:59:27.205342 systemd[1]: Started kubelet.service. Dec 13 01:59:27.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:27.237500 kubelet[1722]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:59:27.237500 kubelet[1722]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:59:27.237500 kubelet[1722]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:59:27.237841 kubelet[1722]: I1213 01:59:27.237518 1722 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:59:27.524863 kubelet[1722]: I1213 01:59:27.524813 1722 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 01:59:27.524863 kubelet[1722]: I1213 01:59:27.524850 1722 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:59:27.525126 kubelet[1722]: I1213 01:59:27.525105 1722 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 01:59:27.536762 kubelet[1722]: E1213 01:59:27.536730 1722 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.133:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:27.538495 kubelet[1722]: I1213 01:59:27.538462 1722 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:59:27.549211 kubelet[1722]: I1213 01:59:27.549167 1722 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:59:27.550927 kubelet[1722]: I1213 01:59:27.550879 1722 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:59:27.551109 kubelet[1722]: I1213 01:59:27.550924 1722 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 01:59:27.551484 kubelet[1722]: I1213 01:59:27.551470 1722 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:59:27.551484 kubelet[1722]: I1213 01:59:27.551484 1722 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 01:59:27.551598 kubelet[1722]: I1213 01:59:27.551585 1722 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:59:27.552181 kubelet[1722]: I1213 01:59:27.552168 1722 kubelet.go:400] "Attempting to sync node with API server" Dec 13 01:59:27.552206 kubelet[1722]: I1213 01:59:27.552182 1722 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:59:27.552206 kubelet[1722]: I1213 01:59:27.552201 1722 kubelet.go:312] "Adding apiserver pod source" Dec 13 01:59:27.552249 kubelet[1722]: I1213 01:59:27.552213 1722 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:59:27.561094 kubelet[1722]: W1213 01:59:27.561046 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:27.561149 kubelet[1722]: E1213 01:59:27.561097 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:27.566875 kubelet[1722]: W1213 01:59:27.566843 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:27.566929 kubelet[1722]: E1213 01:59:27.566879 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:27.568333 kubelet[1722]: I1213 01:59:27.568320 1722 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:59:27.571544 kubelet[1722]: I1213 01:59:27.571525 1722 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:59:27.571588 kubelet[1722]: W1213 01:59:27.571563 1722 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 01:59:27.572011 kubelet[1722]: I1213 01:59:27.571990 1722 server.go:1264] "Started kubelet" Dec 13 01:59:27.572269 kubelet[1722]: I1213 01:59:27.572222 1722 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:59:27.572576 kubelet[1722]: I1213 01:59:27.572562 1722 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:59:27.572681 kubelet[1722]: I1213 01:59:27.572661 1722 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:59:27.571000 audit[1722]: AVC avc: denied { mac_admin } for pid=1722 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.571000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:59:27.571000 audit[1722]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000859320 a1=c000517710 a2=c0008592f0 a3=25 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.571000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:59:27.571000 audit[1722]: AVC avc: denied { mac_admin } for pid=1722 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:27.571000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:59:27.571000 audit[1722]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00060ee20 a1=c000517728 a2=c0008593b0 a3=25 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.571000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:59:27.573158 kubelet[1722]: I1213 01:59:27.572864 1722 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:59:27.573158 kubelet[1722]: I1213 01:59:27.572912 1722 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:59:27.573158 kubelet[1722]: I1213 01:59:27.572971 1722 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:59:27.573974 kubelet[1722]: I1213 01:59:27.573955 1722 server.go:455] "Adding debug handlers to kubelet server" Dec 13 01:59:27.574000 audit[1734]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:27.574000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd593c84d0 a2=0 a3=7ffd593c84bc items=0 ppid=1722 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:59:27.575000 audit[1735]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:27.575000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff460b5cf0 a2=0 a3=7fff460b5cdc items=0 ppid=1722 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:59:27.576832 kubelet[1722]: E1213 01:59:27.575701 1722 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 01:59:27.576832 kubelet[1722]: I1213 01:59:27.575729 1722 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 01:59:27.576832 kubelet[1722]: I1213 01:59:27.575807 1722 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 01:59:27.576832 kubelet[1722]: I1213 01:59:27.575842 1722 reconciler.go:26] "Reconciler: start to sync state" Dec 13 01:59:27.576832 kubelet[1722]: W1213 01:59:27.576081 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:27.576832 kubelet[1722]: E1213 01:59:27.576113 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:27.576832 kubelet[1722]: E1213 01:59:27.576298 1722 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="200ms" Dec 13 01:59:27.576832 kubelet[1722]: I1213 01:59:27.576678 1722 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:59:27.576832 kubelet[1722]: I1213 01:59:27.576747 1722 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:59:27.578238 kubelet[1722]: E1213 01:59:27.577711 1722 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:59:27.578238 kubelet[1722]: I1213 01:59:27.578029 1722 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:59:27.578000 audit[1737]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:27.578000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd1f4b9350 a2=0 a3=7ffd1f4b933c items=0 ppid=1722 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:59:27.580241 kubelet[1722]: E1213 01:59:27.579978 1722 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.133:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.133:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.181099fccc0edce3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 01:59:27.571975395 +0000 UTC m=+0.363635407,LastTimestamp:2024-12-13 01:59:27.571975395 +0000 UTC m=+0.363635407,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 01:59:27.580000 audit[1739]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:27.580000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff4e3a91c0 a2=0 a3=7fff4e3a91ac items=0 ppid=1722 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:59:27.587000 audit[1745]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:27.587000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffed00f4f70 a2=0 a3=7ffed00f4f5c items=0 ppid=1722 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 01:59:27.589161 kubelet[1722]: I1213 01:59:27.589128 1722 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:59:27.588000 audit[1746]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:59:27.588000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde082e6b0 a2=0 a3=7ffde082e69c items=0 ppid=1722 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:59:27.589975 kubelet[1722]: I1213 01:59:27.589880 1722 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:59:27.589975 kubelet[1722]: I1213 01:59:27.589913 1722 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:59:27.589975 kubelet[1722]: I1213 01:59:27.589944 1722 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 01:59:27.590050 kubelet[1722]: E1213 01:59:27.589982 1722 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:59:27.589000 audit[1747]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:27.589000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe81bffd60 a2=0 a3=7ffe81bffd4c items=0 ppid=1722 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:59:27.589000 audit[1748]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:59:27.589000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff38525e50 a2=0 a3=7fff38525e3c items=0 ppid=1722 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:59:27.590000 audit[1749]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:27.590000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7254e220 a2=0 a3=7fff7254e20c items=0 ppid=1722 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:59:27.590000 audit[1750]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:59:27.590000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcd71b41e0 a2=0 a3=7ffcd71b41cc items=0 ppid=1722 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.590000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:59:27.591000 audit[1751]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:59:27.591000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf78c06f0 a2=0 a3=7ffcf78c06dc items=0 ppid=1722 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:59:27.591000 audit[1752]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:59:27.591000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5bf8d670 a2=0 a3=10e3 items=0 ppid=1722 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:27.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:59:27.592607 kubelet[1722]: I1213 01:59:27.592590 1722 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:59:27.592607 kubelet[1722]: I1213 01:59:27.592603 1722 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:59:27.592675 kubelet[1722]: I1213 01:59:27.592616 1722 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:59:27.592797 kubelet[1722]: W1213 01:59:27.592765 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:27.592854 kubelet[1722]: E1213 01:59:27.592804 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:27.676814 kubelet[1722]: I1213 01:59:27.676784 1722 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:59:27.677361 kubelet[1722]: E1213 01:59:27.677317 1722 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 01:59:27.690414 kubelet[1722]: E1213 01:59:27.690392 1722 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 01:59:27.777216 kubelet[1722]: E1213 01:59:27.777128 1722 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="400ms" Dec 13 01:59:27.881886 kubelet[1722]: I1213 01:59:27.881833 1722 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:59:27.882222 kubelet[1722]: E1213 01:59:27.882178 1722 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 01:59:27.891323 kubelet[1722]: E1213 01:59:27.891291 1722 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 01:59:28.044810 kubelet[1722]: I1213 01:59:28.044708 1722 policy_none.go:49] "None policy: Start" Dec 13 01:59:28.045475 kubelet[1722]: I1213 01:59:28.045451 1722 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:59:28.045475 kubelet[1722]: I1213 01:59:28.045472 1722 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:59:28.052637 systemd[1]: Created slice kubepods.slice. Dec 13 01:59:28.056028 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 01:59:28.057963 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 01:59:28.066594 kubelet[1722]: I1213 01:59:28.066572 1722 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:59:28.065000 audit[1722]: AVC avc: denied { mac_admin } for pid=1722 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:28.065000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:59:28.065000 audit[1722]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ecc990 a1=c000725470 a2=c000ecc960 a3=25 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:28.065000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:59:28.066803 kubelet[1722]: I1213 01:59:28.066618 1722 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:59:28.066803 kubelet[1722]: I1213 01:59:28.066697 1722 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 01:59:28.066803 kubelet[1722]: I1213 01:59:28.066781 1722 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:59:28.067518 kubelet[1722]: E1213 01:59:28.067502 1722 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 01:59:28.178246 kubelet[1722]: E1213 01:59:28.178196 1722 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="800ms" Dec 13 01:59:28.283848 kubelet[1722]: I1213 01:59:28.283821 1722 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:59:28.284214 kubelet[1722]: E1213 01:59:28.284185 1722 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 01:59:28.292337 kubelet[1722]: I1213 01:59:28.292300 1722 topology_manager.go:215] "Topology Admit Handler" podUID="849b5877551418b958eb30fe60fda893" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 01:59:28.293092 kubelet[1722]: I1213 01:59:28.293064 1722 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 01:59:28.293699 kubelet[1722]: I1213 01:59:28.293672 1722 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 01:59:28.297811 systemd[1]: Created slice kubepods-burstable-pod849b5877551418b958eb30fe60fda893.slice. Dec 13 01:59:28.307514 systemd[1]: Created slice kubepods-burstable-pod8a50003978138b3ab9890682eff4eae8.slice. Dec 13 01:59:28.309948 systemd[1]: Created slice kubepods-burstable-podb107a98bcf27297d642d248711a3fc70.slice. Dec 13 01:59:28.381310 kubelet[1722]: I1213 01:59:28.381260 1722 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/849b5877551418b958eb30fe60fda893-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"849b5877551418b958eb30fe60fda893\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:59:28.381433 kubelet[1722]: I1213 01:59:28.381311 1722 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/849b5877551418b958eb30fe60fda893-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"849b5877551418b958eb30fe60fda893\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:59:28.381433 kubelet[1722]: I1213 01:59:28.381348 1722 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:28.381433 kubelet[1722]: I1213 01:59:28.381376 1722 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:28.381433 kubelet[1722]: I1213 01:59:28.381402 1722 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:28.381433 kubelet[1722]: I1213 01:59:28.381428 1722 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:28.381553 kubelet[1722]: I1213 01:59:28.381453 1722 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 01:59:28.381553 kubelet[1722]: I1213 01:59:28.381479 1722 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/849b5877551418b958eb30fe60fda893-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"849b5877551418b958eb30fe60fda893\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:59:28.381553 kubelet[1722]: I1213 01:59:28.381504 1722 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:28.530165 kubelet[1722]: W1213 01:59:28.530099 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:28.530165 kubelet[1722]: E1213 01:59:28.530157 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:28.606762 kubelet[1722]: E1213 01:59:28.606644 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:28.607188 env[1219]: time="2024-12-13T01:59:28.607154245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:849b5877551418b958eb30fe60fda893,Namespace:kube-system,Attempt:0,}" Dec 13 01:59:28.609314 kubelet[1722]: E1213 01:59:28.609297 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:28.609593 env[1219]: time="2024-12-13T01:59:28.609561169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,}" Dec 13 01:59:28.611804 kubelet[1722]: E1213 01:59:28.611770 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:28.612097 env[1219]: time="2024-12-13T01:59:28.612070666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,}" Dec 13 01:59:28.680965 kubelet[1722]: W1213 01:59:28.680863 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:28.680965 kubelet[1722]: E1213 01:59:28.680963 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:28.820999 kubelet[1722]: W1213 01:59:28.820907 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:28.820999 kubelet[1722]: E1213 01:59:28.821004 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:28.978876 kubelet[1722]: E1213 01:59:28.978826 1722 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="1.6s" Dec 13 01:59:28.985344 kubelet[1722]: W1213 01:59:28.985289 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:28.985344 kubelet[1722]: E1213 01:59:28.985344 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:29.004765 env[1219]: time="2024-12-13T01:59:29.004690459Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:849b5877551418b958eb30fe60fda893,Namespace:kube-system,Attempt:0,} failed, error" error="failed to get sandbox image \"registry.k8s.io/pause:3.6\": failed to pull image \"registry.k8s.io/pause:3.6\": failed to pull and unpack image \"registry.k8s.io/pause:3.6\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com/containers/images/sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee\": dial tcp: lookup prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com: no such host" Dec 13 01:59:29.005074 kubelet[1722]: E1213 01:59:29.005015 1722 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to get sandbox image \"registry.k8s.io/pause:3.6\": failed to pull image \"registry.k8s.io/pause:3.6\": failed to pull and unpack image \"registry.k8s.io/pause:3.6\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com/containers/images/sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee\": dial tcp: lookup prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com: no such host" Dec 13 01:59:29.005329 kubelet[1722]: E1213 01:59:29.005103 1722 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to get sandbox image \"registry.k8s.io/pause:3.6\": failed to pull image \"registry.k8s.io/pause:3.6\": failed to pull and unpack image \"registry.k8s.io/pause:3.6\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com/containers/images/sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee\": dial tcp: lookup prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com: no such host" pod="kube-system/kube-apiserver-localhost" Dec 13 01:59:29.005329 kubelet[1722]: E1213 01:59:29.005127 1722 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to get sandbox image \"registry.k8s.io/pause:3.6\": failed to pull image \"registry.k8s.io/pause:3.6\": failed to pull and unpack image \"registry.k8s.io/pause:3.6\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com/containers/images/sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee\": dial tcp: lookup prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com: no such host" pod="kube-system/kube-apiserver-localhost" Dec 13 01:59:29.005444 kubelet[1722]: E1213 01:59:29.005178 1722 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"kube-apiserver-localhost_kube-system(849b5877551418b958eb30fe60fda893)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"kube-apiserver-localhost_kube-system(849b5877551418b958eb30fe60fda893)\\\": rpc error: code = Unknown desc = failed to get sandbox image \\\"registry.k8s.io/pause:3.6\\\": failed to pull image \\\"registry.k8s.io/pause:3.6\\\": failed to pull and unpack image \\\"registry.k8s.io/pause:3.6\\\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \\\"https://prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com/containers/images/sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee\\\": dial tcp: lookup prod-registry-k8s-io-us-west-1.s3.dualstack.us-west-1.amazonaws.com: no such host\"" pod="kube-system/kube-apiserver-localhost" podUID="849b5877551418b958eb30fe60fda893" Dec 13 01:59:29.085734 kubelet[1722]: I1213 01:59:29.085701 1722 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:59:29.086126 kubelet[1722]: E1213 01:59:29.086076 1722 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 01:59:29.173769 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3083344947.mount: Deactivated successfully. Dec 13 01:59:29.178842 env[1219]: time="2024-12-13T01:59:29.178792084Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:29.181342 env[1219]: time="2024-12-13T01:59:29.181303404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:29.182866 env[1219]: time="2024-12-13T01:59:29.182814389Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:29.184140 env[1219]: time="2024-12-13T01:59:29.184112353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:29.185181 env[1219]: time="2024-12-13T01:59:29.185156401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:29.186404 env[1219]: time="2024-12-13T01:59:29.186377161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:29.187651 env[1219]: time="2024-12-13T01:59:29.187623629Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:29.189146 env[1219]: time="2024-12-13T01:59:29.189122290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:59:29.209100 env[1219]: time="2024-12-13T01:59:29.209023419Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:59:29.209100 env[1219]: time="2024-12-13T01:59:29.209070137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:59:29.209363 env[1219]: time="2024-12-13T01:59:29.209324023Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:59:29.209635 env[1219]: time="2024-12-13T01:59:29.209582157Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d796140872adb818a834672934c944da129376da43539fe3139d2b4eb6f5959 pid=1762 runtime=io.containerd.runc.v2 Dec 13 01:59:29.210267 env[1219]: time="2024-12-13T01:59:29.210110408Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:59:29.210267 env[1219]: time="2024-12-13T01:59:29.210145133Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:59:29.210267 env[1219]: time="2024-12-13T01:59:29.210155242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:59:29.210383 env[1219]: time="2024-12-13T01:59:29.210286919Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68a58e51706292b7202ada4b3d5707c299adc1c206873e063a768726ffc0391c pid=1774 runtime=io.containerd.runc.v2 Dec 13 01:59:29.220218 systemd[1]: Started cri-containerd-2d796140872adb818a834672934c944da129376da43539fe3139d2b4eb6f5959.scope. Dec 13 01:59:29.228291 systemd[1]: Started cri-containerd-68a58e51706292b7202ada4b3d5707c299adc1c206873e063a768726ffc0391c.scope. Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.231000 audit: BPF prog-id=55 op=LOAD Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cdc48 a2=10 a3=1c items=0 ppid=1762 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373936313430383732616462383138613833343637323933346339 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cd6b0 a2=3c a3=c items=0 ppid=1762 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373936313430383732616462383138613833343637323933346339 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit: BPF prog-id=56 op=LOAD Dec 13 01:59:29.232000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cd9d8 a2=78 a3=c000111f00 items=0 ppid=1762 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373936313430383732616462383138613833343637323933346339 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit: BPF prog-id=57 op=LOAD Dec 13 01:59:29.232000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cd770 a2=78 a3=c000111f48 items=0 ppid=1762 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373936313430383732616462383138613833343637323933346339 Dec 13 01:59:29.232000 audit: BPF prog-id=57 op=UNLOAD Dec 13 01:59:29.232000 audit: BPF prog-id=56 op=UNLOAD Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.232000 audit: BPF prog-id=58 op=LOAD Dec 13 01:59:29.232000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cdc30 a2=78 a3=c00040c358 items=0 ppid=1762 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373936313430383732616462383138613833343637323933346339 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.237000 audit: BPF prog-id=59 op=LOAD Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1774 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613538653531373036323932623732303261646134623364353730 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1774 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613538653531373036323932623732303261646134623364353730 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.238000 audit: BPF prog-id=60 op=LOAD Dec 13 01:59:29.238000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000257eb0 items=0 ppid=1774 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613538653531373036323932623732303261646134623364353730 Dec 13 01:59:29.239000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.239000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.239000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.239000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.239000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.239000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.239000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.239000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.239000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.239000 audit: BPF prog-id=61 op=LOAD Dec 13 01:59:29.239000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000257ef8 items=0 ppid=1774 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613538653531373036323932623732303261646134623364353730 Dec 13 01:59:29.240000 audit: BPF prog-id=61 op=UNLOAD Dec 13 01:59:29.240000 audit: BPF prog-id=60 op=UNLOAD Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.240000 audit: BPF prog-id=62 op=LOAD Dec 13 01:59:29.240000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000348308 items=0 ppid=1774 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613538653531373036323932623732303261646134623364353730 Dec 13 01:59:29.259148 env[1219]: time="2024-12-13T01:59:29.259088848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,} returns sandbox id \"2d796140872adb818a834672934c944da129376da43539fe3139d2b4eb6f5959\"" Dec 13 01:59:29.260040 kubelet[1722]: E1213 01:59:29.260013 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:29.262203 env[1219]: time="2024-12-13T01:59:29.262176199Z" level=info msg="CreateContainer within sandbox \"2d796140872adb818a834672934c944da129376da43539fe3139d2b4eb6f5959\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 01:59:29.263646 env[1219]: time="2024-12-13T01:59:29.263605309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,} returns sandbox id \"68a58e51706292b7202ada4b3d5707c299adc1c206873e063a768726ffc0391c\"" Dec 13 01:59:29.264201 kubelet[1722]: E1213 01:59:29.264177 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:29.265747 env[1219]: time="2024-12-13T01:59:29.265724905Z" level=info msg="CreateContainer within sandbox \"68a58e51706292b7202ada4b3d5707c299adc1c206873e063a768726ffc0391c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 01:59:29.592886 env[1219]: time="2024-12-13T01:59:29.592749309Z" level=info msg="CreateContainer within sandbox \"2d796140872adb818a834672934c944da129376da43539fe3139d2b4eb6f5959\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"50f7699f0c788868053687f29d4e6e454293ed1be4554c060c504230b5463b24\"" Dec 13 01:59:29.593360 env[1219]: time="2024-12-13T01:59:29.593336471Z" level=info msg="StartContainer for \"50f7699f0c788868053687f29d4e6e454293ed1be4554c060c504230b5463b24\"" Dec 13 01:59:29.606155 systemd[1]: Started cri-containerd-50f7699f0c788868053687f29d4e6e454293ed1be4554c060c504230b5463b24.scope. Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit: BPF prog-id=63 op=LOAD Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1762 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663736393966306337383838363830353336383766323964346536 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1762 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663736393966306337383838363830353336383766323964346536 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit: BPF prog-id=64 op=LOAD Dec 13 01:59:29.617000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000995c0 items=0 ppid=1762 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663736393966306337383838363830353336383766323964346536 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.617000 audit: BPF prog-id=65 op=LOAD Dec 13 01:59:29.617000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099608 items=0 ppid=1762 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663736393966306337383838363830353336383766323964346536 Dec 13 01:59:29.617000 audit: BPF prog-id=65 op=UNLOAD Dec 13 01:59:29.618000 audit: BPF prog-id=64 op=UNLOAD Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.618000 audit: BPF prog-id=66 op=LOAD Dec 13 01:59:29.618000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099a18 items=0 ppid=1762 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663736393966306337383838363830353336383766323964346536 Dec 13 01:59:29.641473 env[1219]: time="2024-12-13T01:59:29.641415673Z" level=info msg="StartContainer for \"50f7699f0c788868053687f29d4e6e454293ed1be4554c060c504230b5463b24\" returns successfully" Dec 13 01:59:29.651398 env[1219]: time="2024-12-13T01:59:29.651348785Z" level=info msg="CreateContainer within sandbox \"68a58e51706292b7202ada4b3d5707c299adc1c206873e063a768726ffc0391c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a5bd2ddacf15257d0dde3abdf319e13c6e0029ccad1f46ed97a15315a3c7e051\"" Dec 13 01:59:29.652064 env[1219]: time="2024-12-13T01:59:29.652011218Z" level=info msg="StartContainer for \"a5bd2ddacf15257d0dde3abdf319e13c6e0029ccad1f46ed97a15315a3c7e051\"" Dec 13 01:59:29.664334 systemd[1]: Started cri-containerd-a5bd2ddacf15257d0dde3abdf319e13c6e0029ccad1f46ed97a15315a3c7e051.scope. Dec 13 01:59:29.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit: BPF prog-id=67 op=LOAD Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1774 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626432646461636631353235376430646465336162646633313965 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1774 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626432646461636631353235376430646465336162646633313965 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit: BPF prog-id=68 op=LOAD Dec 13 01:59:29.676000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000b0720 items=0 ppid=1774 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626432646461636631353235376430646465336162646633313965 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit: BPF prog-id=69 op=LOAD Dec 13 01:59:29.676000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000b0768 items=0 ppid=1774 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626432646461636631353235376430646465336162646633313965 Dec 13 01:59:29.676000 audit: BPF prog-id=69 op=UNLOAD Dec 13 01:59:29.676000 audit: BPF prog-id=68 op=UNLOAD Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:29.676000 audit: BPF prog-id=70 op=LOAD Dec 13 01:59:29.676000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000b0b78 items=0 ppid=1774 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:29.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626432646461636631353235376430646465336162646633313965 Dec 13 01:59:29.701264 env[1219]: time="2024-12-13T01:59:29.701224668Z" level=info msg="StartContainer for \"a5bd2ddacf15257d0dde3abdf319e13c6e0029ccad1f46ed97a15315a3c7e051\" returns successfully" Dec 13 01:59:29.734204 kubelet[1722]: E1213 01:59:29.734175 1722 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.133:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:30.469000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:30.469000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000058090 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:30.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:30.469000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:30.469000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000158480 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:30.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:30.580073 kubelet[1722]: E1213 01:59:30.580000 1722 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="3.2s" Dec 13 01:59:30.600801 kubelet[1722]: E1213 01:59:30.600753 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:30.601472 kubelet[1722]: E1213 01:59:30.601439 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:30.658359 kubelet[1722]: W1213 01:59:30.658275 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:30.658359 kubelet[1722]: E1213 01:59:30.658352 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:30.687555 kubelet[1722]: I1213 01:59:30.687528 1722 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:59:30.687862 kubelet[1722]: E1213 01:59:30.687806 1722 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 01:59:31.071377 kubelet[1722]: W1213 01:59:31.071299 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:31.071377 kubelet[1722]: E1213 01:59:31.071375 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:31.477356 kubelet[1722]: W1213 01:59:31.477285 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:31.477356 kubelet[1722]: E1213 01:59:31.477344 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:31.603214 kubelet[1722]: E1213 01:59:31.603176 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:31.603214 kubelet[1722]: E1213 01:59:31.603210 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:32.003592 kubelet[1722]: W1213 01:59:32.003522 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:32.003592 kubelet[1722]: E1213 01:59:32.003590 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:33.780604 kubelet[1722]: E1213 01:59:33.780548 1722 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="6.4s" Dec 13 01:59:33.888902 kubelet[1722]: I1213 01:59:33.888862 1722 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:59:33.889189 kubelet[1722]: E1213 01:59:33.889151 1722 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 01:59:34.051603 kubelet[1722]: E1213 01:59:34.051507 1722 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.133:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:34.529288 kubelet[1722]: E1213 01:59:34.529182 1722 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.133:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.133:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.181099fccc0edce3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 01:59:27.571975395 +0000 UTC m=+0.363635407,LastTimestamp:2024-12-13 01:59:27.571975395 +0000 UTC m=+0.363635407,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 01:59:35.027238 kubelet[1722]: W1213 01:59:35.027176 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:35.027238 kubelet[1722]: E1213 01:59:35.027222 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:35.849455 kubelet[1722]: W1213 01:59:35.849393 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:35.849455 kubelet[1722]: E1213 01:59:35.849447 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:36.642765 kubelet[1722]: W1213 01:59:36.642709 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:36.642765 kubelet[1722]: E1213 01:59:36.642762 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:37.909735 kubelet[1722]: W1213 01:59:37.909687 1722 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:37.909735 kubelet[1722]: E1213 01:59:37.909736 1722 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:38.067673 kubelet[1722]: E1213 01:59:38.067614 1722 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 01:59:38.403610 kubelet[1722]: E1213 01:59:38.403534 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:39.670568 kubelet[1722]: E1213 01:59:39.670500 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:40.181102 kubelet[1722]: E1213 01:59:40.181044 1722 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="7s" Dec 13 01:59:40.290702 kubelet[1722]: I1213 01:59:40.290662 1722 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:59:40.291048 kubelet[1722]: E1213 01:59:40.291013 1722 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 01:59:40.615146 kubelet[1722]: E1213 01:59:40.615041 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:42.266292 kubelet[1722]: E1213 01:59:42.266244 1722 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.133:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 01:59:42.850220 update_engine[1214]: I1213 01:59:42.850181 1214 update_attempter.cc:509] Updating boot flags... Dec 13 01:59:43.591473 kubelet[1722]: E1213 01:59:43.591448 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:43.591864 env[1219]: time="2024-12-13T01:59:43.591804605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:849b5877551418b958eb30fe60fda893,Namespace:kube-system,Attempt:0,}" Dec 13 01:59:43.608593 env[1219]: time="2024-12-13T01:59:43.608529775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:59:43.608593 env[1219]: time="2024-12-13T01:59:43.608564671Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:59:43.608593 env[1219]: time="2024-12-13T01:59:43.608575181Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:59:43.608777 env[1219]: time="2024-12-13T01:59:43.608707243Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9d7772ef7a184035684268059627f1432276f7a88a67ebe552990778d399d483 pid=1934 runtime=io.containerd.runc.v2 Dec 13 01:59:43.622081 systemd[1]: Started cri-containerd-9d7772ef7a184035684268059627f1432276f7a88a67ebe552990778d399d483.scope. Dec 13 01:59:43.635141 kernel: kauditd_printk_skb: 451 callbacks suppressed Dec 13 01:59:43.635227 kernel: audit: type=1400 audit(1734055183.629:513): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.635249 kernel: audit: type=1400 audit(1734055183.629:514): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.641384 kernel: audit: type=1400 audit(1734055183.629:515): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.641429 kernel: audit: type=1400 audit(1734055183.629:516): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.644793 kernel: audit: type=1400 audit(1734055183.629:517): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.648070 kernel: audit: type=1400 audit(1734055183.629:518): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.651216 kernel: audit: type=1400 audit(1734055183.629:519): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.654155 kernel: audit: type=1400 audit(1734055183.629:520): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.657102 kernel: audit: type=1400 audit(1734055183.629:521): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.659918 kernel: audit: type=1400 audit(1734055183.634:522): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit: BPF prog-id=71 op=LOAD Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1934 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373737326566376131383430333536383432363830353936323766 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1934 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373737326566376131383430333536383432363830353936323766 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.634000 audit: BPF prog-id=72 op=LOAD Dec 13 01:59:43.634000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfce0 items=0 ppid=1934 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373737326566376131383430333536383432363830353936323766 Dec 13 01:59:43.637000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.637000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.637000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.637000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.637000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.637000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.637000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.637000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.637000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.637000 audit: BPF prog-id=73 op=LOAD Dec 13 01:59:43.637000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd28 items=0 ppid=1934 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373737326566376131383430333536383432363830353936323766 Dec 13 01:59:43.643000 audit: BPF prog-id=73 op=UNLOAD Dec 13 01:59:43.643000 audit: BPF prog-id=72 op=UNLOAD Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.643000 audit: BPF prog-id=74 op=LOAD Dec 13 01:59:43.643000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e0138 items=0 ppid=1934 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373737326566376131383430333536383432363830353936323766 Dec 13 01:59:43.686595 env[1219]: time="2024-12-13T01:59:43.686562478Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:849b5877551418b958eb30fe60fda893,Namespace:kube-system,Attempt:0,} returns sandbox id \"9d7772ef7a184035684268059627f1432276f7a88a67ebe552990778d399d483\"" Dec 13 01:59:43.687339 kubelet[1722]: E1213 01:59:43.687309 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:43.689196 env[1219]: time="2024-12-13T01:59:43.689157493Z" level=info msg="CreateContainer within sandbox \"9d7772ef7a184035684268059627f1432276f7a88a67ebe552990778d399d483\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 01:59:43.703152 env[1219]: time="2024-12-13T01:59:43.703113437Z" level=info msg="CreateContainer within sandbox \"9d7772ef7a184035684268059627f1432276f7a88a67ebe552990778d399d483\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3ddff107a123b774e520a2bfd4abd7cef6f5f02a2c94fec67e81649e3abff8ec\"" Dec 13 01:59:43.703496 env[1219]: time="2024-12-13T01:59:43.703464234Z" level=info msg="StartContainer for \"3ddff107a123b774e520a2bfd4abd7cef6f5f02a2c94fec67e81649e3abff8ec\"" Dec 13 01:59:43.716923 systemd[1]: Started cri-containerd-3ddff107a123b774e520a2bfd4abd7cef6f5f02a2c94fec67e81649e3abff8ec.scope. Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.725000 audit: BPF prog-id=75 op=LOAD Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1934 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364646666313037613132336237373465353230613262666434616264 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1934 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364646666313037613132336237373465353230613262666434616264 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit: BPF prog-id=76 op=LOAD Dec 13 01:59:43.726000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000096890 items=0 ppid=1934 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364646666313037613132336237373465353230613262666434616264 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit: BPF prog-id=77 op=LOAD Dec 13 01:59:43.726000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000968d8 items=0 ppid=1934 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364646666313037613132336237373465353230613262666434616264 Dec 13 01:59:43.726000 audit: BPF prog-id=77 op=UNLOAD Dec 13 01:59:43.726000 audit: BPF prog-id=76 op=UNLOAD Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:43.726000 audit: BPF prog-id=78 op=LOAD Dec 13 01:59:43.726000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000096ce8 items=0 ppid=1934 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:43.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364646666313037613132336237373465353230613262666434616264 Dec 13 01:59:43.750383 env[1219]: time="2024-12-13T01:59:43.750345369Z" level=info msg="StartContainer for \"3ddff107a123b774e520a2bfd4abd7cef6f5f02a2c94fec67e81649e3abff8ec\" returns successfully" Dec 13 01:59:44.560000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:44.560000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005f47740 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 01:59:44.560000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:59:44.561000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:44.561000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0056bbbc0 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 01:59:44.561000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:59:44.561000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:44.561000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c004a2ee40 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 01:59:44.561000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:59:44.563000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:44.563000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c005f47c20 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 01:59:44.563000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:59:44.564000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:44.564000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c003bf9830 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 01:59:44.564000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:59:44.564000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:44.564000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c004156a80 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 01:59:44.564000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:59:44.622951 kubelet[1722]: E1213 01:59:44.622903 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:44.925163 kubelet[1722]: E1213 01:59:44.925122 1722 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 01:59:45.275850 kubelet[1722]: E1213 01:59:45.275747 1722 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 01:59:45.562278 kubelet[1722]: I1213 01:59:45.562121 1722 apiserver.go:52] "Watching apiserver" Dec 13 01:59:45.576805 kubelet[1722]: I1213 01:59:45.576774 1722 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 01:59:45.624070 kubelet[1722]: E1213 01:59:45.624046 1722 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:45.749198 kubelet[1722]: E1213 01:59:45.749151 1722 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 01:59:46.743024 kubelet[1722]: E1213 01:59:46.742973 1722 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 01:59:47.184725 kubelet[1722]: E1213 01:59:47.184691 1722 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 01:59:47.292748 kubelet[1722]: I1213 01:59:47.292714 1722 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:59:47.299604 kubelet[1722]: I1213 01:59:47.299562 1722 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 01:59:47.789728 systemd[1]: Reloading. Dec 13 01:59:47.849962 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-12-13T01:59:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:59:47.849986 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-12-13T01:59:47Z" level=info msg="torcx already run" Dec 13 01:59:47.908509 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:59:47.908524 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:59:47.925199 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:59:47.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit: BPF prog-id=79 op=LOAD Dec 13 01:59:47.989000 audit: BPF prog-id=40 op=UNLOAD Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.989000 audit: BPF prog-id=80 op=LOAD Dec 13 01:59:47.989000 audit: BPF prog-id=41 op=UNLOAD Dec 13 01:59:47.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit: BPF prog-id=81 op=LOAD Dec 13 01:59:47.991000 audit: BPF prog-id=75 op=UNLOAD Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.991000 audit: BPF prog-id=82 op=LOAD Dec 13 01:59:47.991000 audit: BPF prog-id=63 op=UNLOAD Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit: BPF prog-id=83 op=LOAD Dec 13 01:59:47.992000 audit: BPF prog-id=42 op=UNLOAD Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit: BPF prog-id=84 op=LOAD Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.992000 audit: BPF prog-id=85 op=LOAD Dec 13 01:59:47.992000 audit: BPF prog-id=43 op=UNLOAD Dec 13 01:59:47.992000 audit: BPF prog-id=44 op=UNLOAD Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.993000 audit: BPF prog-id=86 op=LOAD Dec 13 01:59:47.993000 audit: BPF prog-id=71 op=UNLOAD Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit: BPF prog-id=87 op=LOAD Dec 13 01:59:47.994000 audit: BPF prog-id=55 op=UNLOAD Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit: BPF prog-id=88 op=LOAD Dec 13 01:59:47.995000 audit: BPF prog-id=45 op=UNLOAD Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit: BPF prog-id=89 op=LOAD Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.995000 audit: BPF prog-id=90 op=LOAD Dec 13 01:59:47.995000 audit: BPF prog-id=46 op=UNLOAD Dec 13 01:59:47.995000 audit: BPF prog-id=47 op=UNLOAD Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit: BPF prog-id=91 op=LOAD Dec 13 01:59:47.997000 audit: BPF prog-id=48 op=UNLOAD Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit: BPF prog-id=92 op=LOAD Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.997000 audit: BPF prog-id=93 op=LOAD Dec 13 01:59:47.997000 audit: BPF prog-id=49 op=UNLOAD Dec 13 01:59:47.997000 audit: BPF prog-id=50 op=UNLOAD Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.998000 audit: BPF prog-id=94 op=LOAD Dec 13 01:59:47.998000 audit: BPF prog-id=67 op=UNLOAD Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit: BPF prog-id=95 op=LOAD Dec 13 01:59:47.999000 audit: BPF prog-id=51 op=UNLOAD Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit: BPF prog-id=96 op=LOAD Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit: BPF prog-id=97 op=LOAD Dec 13 01:59:47.999000 audit: BPF prog-id=52 op=UNLOAD Dec 13 01:59:47.999000 audit: BPF prog-id=53 op=UNLOAD Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:47.999000 audit: BPF prog-id=98 op=LOAD Dec 13 01:59:47.999000 audit: BPF prog-id=59 op=UNLOAD Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.000000 audit: BPF prog-id=99 op=LOAD Dec 13 01:59:48.000000 audit: BPF prog-id=54 op=UNLOAD Dec 13 01:59:48.010072 systemd[1]: Stopping kubelet.service... Dec 13 01:59:48.032168 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:59:48.032305 systemd[1]: Stopped kubelet.service. Dec 13 01:59:48.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:48.033636 systemd[1]: Starting kubelet.service... Dec 13 01:59:48.119902 systemd[1]: Started kubelet.service. Dec 13 01:59:48.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:48.156818 kubelet[2076]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:59:48.156818 kubelet[2076]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:59:48.156818 kubelet[2076]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:59:48.157166 kubelet[2076]: I1213 01:59:48.156850 2076 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:59:48.160816 kubelet[2076]: I1213 01:59:48.160792 2076 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 01:59:48.160887 kubelet[2076]: I1213 01:59:48.160873 2076 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:59:48.161326 kubelet[2076]: I1213 01:59:48.161312 2076 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 01:59:48.162911 kubelet[2076]: I1213 01:59:48.162883 2076 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 01:59:48.163756 kubelet[2076]: I1213 01:59:48.163735 2076 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:59:48.169293 kubelet[2076]: I1213 01:59:48.169254 2076 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:59:48.169449 kubelet[2076]: I1213 01:59:48.169413 2076 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:59:48.169604 kubelet[2076]: I1213 01:59:48.169437 2076 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 01:59:48.169689 kubelet[2076]: I1213 01:59:48.169607 2076 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:59:48.169689 kubelet[2076]: I1213 01:59:48.169616 2076 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 01:59:48.169689 kubelet[2076]: I1213 01:59:48.169645 2076 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:59:48.169766 kubelet[2076]: I1213 01:59:48.169721 2076 kubelet.go:400] "Attempting to sync node with API server" Dec 13 01:59:48.169766 kubelet[2076]: I1213 01:59:48.169732 2076 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:59:48.169766 kubelet[2076]: I1213 01:59:48.169748 2076 kubelet.go:312] "Adding apiserver pod source" Dec 13 01:59:48.169766 kubelet[2076]: I1213 01:59:48.169763 2076 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:59:48.171103 kubelet[2076]: I1213 01:59:48.171080 2076 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:59:48.172119 kubelet[2076]: I1213 01:59:48.172103 2076 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:59:48.172610 kubelet[2076]: I1213 01:59:48.172596 2076 server.go:1264] "Started kubelet" Dec 13 01:59:48.173121 kubelet[2076]: I1213 01:59:48.173066 2076 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:59:48.173274 kubelet[2076]: I1213 01:59:48.173231 2076 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:59:48.175505 kubelet[2076]: I1213 01:59:48.175474 2076 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:59:48.176383 kubelet[2076]: I1213 01:59:48.176367 2076 server.go:455] "Adding debug handlers to kubelet server" Dec 13 01:59:48.182506 kubelet[2076]: I1213 01:59:48.182464 2076 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:59:48.182506 kubelet[2076]: I1213 01:59:48.182511 2076 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:59:48.182668 kubelet[2076]: I1213 01:59:48.182539 2076 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:59:48.181000 audit[2076]: AVC avc: denied { mac_admin } for pid=2076 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.181000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:59:48.181000 audit[2076]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d4cf90 a1=c000853908 a2=c000d4cf60 a3=25 items=0 ppid=1 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:48.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:59:48.181000 audit[2076]: AVC avc: denied { mac_admin } for pid=2076 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.181000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:59:48.181000 audit[2076]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ea6e80 a1=c000853920 a2=c000d4d020 a3=25 items=0 ppid=1 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:48.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:59:48.184643 kubelet[2076]: E1213 01:59:48.184618 2076 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:59:48.185060 kubelet[2076]: I1213 01:59:48.184828 2076 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 01:59:48.185060 kubelet[2076]: I1213 01:59:48.184921 2076 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 01:59:48.185060 kubelet[2076]: I1213 01:59:48.185041 2076 reconciler.go:26] "Reconciler: start to sync state" Dec 13 01:59:48.187198 kubelet[2076]: I1213 01:59:48.187180 2076 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:59:48.187306 kubelet[2076]: I1213 01:59:48.187292 2076 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:59:48.187473 kubelet[2076]: I1213 01:59:48.187439 2076 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:59:48.194854 kubelet[2076]: I1213 01:59:48.194812 2076 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:59:48.195834 kubelet[2076]: I1213 01:59:48.195804 2076 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:59:48.195834 kubelet[2076]: I1213 01:59:48.195826 2076 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:59:48.195969 kubelet[2076]: I1213 01:59:48.195850 2076 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 01:59:48.195969 kubelet[2076]: E1213 01:59:48.195894 2076 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:59:48.214195 kubelet[2076]: I1213 01:59:48.214168 2076 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:59:48.214195 kubelet[2076]: I1213 01:59:48.214185 2076 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:59:48.214195 kubelet[2076]: I1213 01:59:48.214202 2076 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:59:48.214385 kubelet[2076]: I1213 01:59:48.214338 2076 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 01:59:48.214385 kubelet[2076]: I1213 01:59:48.214347 2076 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 01:59:48.214385 kubelet[2076]: I1213 01:59:48.214363 2076 policy_none.go:49] "None policy: Start" Dec 13 01:59:48.214820 kubelet[2076]: I1213 01:59:48.214798 2076 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:59:48.214820 kubelet[2076]: I1213 01:59:48.214817 2076 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:59:48.214955 kubelet[2076]: I1213 01:59:48.214916 2076 state_mem.go:75] "Updated machine memory state" Dec 13 01:59:48.217723 kubelet[2076]: I1213 01:59:48.217705 2076 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:59:48.216000 audit[2076]: AVC avc: denied { mac_admin } for pid=2076 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:59:48.216000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:59:48.216000 audit[2076]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001224300 a1=c00122b1e8 a2=c0012242d0 a3=25 items=0 ppid=1 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:59:48.216000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:59:48.217997 kubelet[2076]: I1213 01:59:48.217768 2076 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:59:48.217997 kubelet[2076]: I1213 01:59:48.217867 2076 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 01:59:48.217997 kubelet[2076]: I1213 01:59:48.217969 2076 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:59:48.288390 kubelet[2076]: I1213 01:59:48.288364 2076 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 01:59:48.294585 kubelet[2076]: I1213 01:59:48.294554 2076 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 01:59:48.294674 kubelet[2076]: I1213 01:59:48.294609 2076 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 01:59:48.296150 kubelet[2076]: I1213 01:59:48.296112 2076 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 01:59:48.296233 kubelet[2076]: I1213 01:59:48.296217 2076 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 01:59:48.296307 kubelet[2076]: I1213 01:59:48.296292 2076 topology_manager.go:215] "Topology Admit Handler" podUID="849b5877551418b958eb30fe60fda893" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 01:59:48.486095 kubelet[2076]: I1213 01:59:48.486049 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:48.486095 kubelet[2076]: I1213 01:59:48.486085 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 01:59:48.486095 kubelet[2076]: I1213 01:59:48.486105 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/849b5877551418b958eb30fe60fda893-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"849b5877551418b958eb30fe60fda893\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:59:48.486304 kubelet[2076]: I1213 01:59:48.486121 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/849b5877551418b958eb30fe60fda893-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"849b5877551418b958eb30fe60fda893\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:59:48.486304 kubelet[2076]: I1213 01:59:48.486139 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:48.486304 kubelet[2076]: I1213 01:59:48.486166 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:48.486304 kubelet[2076]: I1213 01:59:48.486191 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/849b5877551418b958eb30fe60fda893-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"849b5877551418b958eb30fe60fda893\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:59:48.486304 kubelet[2076]: I1213 01:59:48.486214 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:48.486411 kubelet[2076]: I1213 01:59:48.486228 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:59:48.603569 kubelet[2076]: E1213 01:59:48.603531 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:48.603786 kubelet[2076]: E1213 01:59:48.603752 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:48.604088 kubelet[2076]: E1213 01:59:48.604054 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:49.170742 kubelet[2076]: I1213 01:59:49.170707 2076 apiserver.go:52] "Watching apiserver" Dec 13 01:59:49.185496 kubelet[2076]: I1213 01:59:49.185468 2076 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 01:59:49.204116 kubelet[2076]: E1213 01:59:49.204098 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:49.204221 kubelet[2076]: E1213 01:59:49.204119 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:49.413787 kubelet[2076]: E1213 01:59:49.413746 2076 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 01:59:49.414272 kubelet[2076]: E1213 01:59:49.414249 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:49.414858 kubelet[2076]: I1213 01:59:49.414790 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.414778664 podStartE2EDuration="1.414778664s" podCreationTimestamp="2024-12-13 01:59:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:59:49.413898958 +0000 UTC m=+1.290948627" watchObservedRunningTime="2024-12-13 01:59:49.414778664 +0000 UTC m=+1.291828333" Dec 13 01:59:49.513503 kubelet[2076]: I1213 01:59:49.513380 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.513362584 podStartE2EDuration="1.513362584s" podCreationTimestamp="2024-12-13 01:59:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:59:49.448704934 +0000 UTC m=+1.325754603" watchObservedRunningTime="2024-12-13 01:59:49.513362584 +0000 UTC m=+1.390412243" Dec 13 01:59:49.513503 kubelet[2076]: I1213 01:59:49.513491 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.513487692 podStartE2EDuration="1.513487692s" podCreationTimestamp="2024-12-13 01:59:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:59:49.51321223 +0000 UTC m=+1.390261899" watchObservedRunningTime="2024-12-13 01:59:49.513487692 +0000 UTC m=+1.390537361" Dec 13 01:59:49.518968 kernel: kauditd_printk_skb: 380 callbacks suppressed Dec 13 01:59:49.519056 kernel: audit: type=1400 audit(1734055189.513:804): avc: denied { watch } for pid=1856 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 01:59:49.513000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 01:59:49.513000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e5e900 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:49.524689 kernel: audit: type=1300 audit(1734055189.513:804): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e5e900 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:49.524756 kernel: audit: type=1327 audit(1734055189.513:804): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:49.513000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:50.214098 kubelet[2076]: E1213 01:59:50.214073 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:50.550087 kubelet[2076]: E1213 01:59:50.549984 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:51.215657 kubelet[2076]: E1213 01:59:51.215620 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:53.360627 sudo[1350]: pam_unix(sudo:session): session closed for user root Dec 13 01:59:53.359000 audit[1350]: USER_END pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:53.359000 audit[1350]: CRED_DISP pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:53.364748 sshd[1347]: pam_unix(sshd:session): session closed for user core Dec 13 01:59:53.367004 systemd[1]: sshd@6-10.0.0.133:22-10.0.0.1:42566.service: Deactivated successfully. Dec 13 01:59:53.367584 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 01:59:53.367659 kernel: audit: type=1106 audit(1734055193.359:805): pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:53.367693 kernel: audit: type=1104 audit(1734055193.359:806): pid=1350 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:59:53.367694 systemd[1]: session-7.scope: Consumed 3.711s CPU time. Dec 13 01:59:53.364000 audit[1347]: USER_END pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:53.368079 systemd-logind[1206]: Session 7 logged out. Waiting for processes to exit. Dec 13 01:59:53.368691 systemd-logind[1206]: Removed session 7. Dec 13 01:59:53.371998 kernel: audit: type=1106 audit(1734055193.364:807): pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:53.372093 kernel: audit: type=1104 audit(1734055193.364:808): pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:53.364000 audit[1347]: CRED_DISP pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:59:53.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.133:22-10.0.0.1:42566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:53.378645 kernel: audit: type=1131 audit(1734055193.366:809): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.133:22-10.0.0.1:42566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:59:54.514792 kubelet[2076]: E1213 01:59:54.514740 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:55.220181 kubelet[2076]: E1213 01:59:55.220153 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:56.501959 kubelet[2076]: E1213 01:59:56.501904 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:57.223156 kubelet[2076]: E1213 01:59:57.223122 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:59:59.963000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:59.963000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e088c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:59.986124 kernel: audit: type=1400 audit(1734055199.963:810): avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:59.986181 kernel: audit: type=1300 audit(1734055199.963:810): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e088c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:59.986199 kernel: audit: type=1327 audit(1734055199.963:810): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:59.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:59.963000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:59.993893 kernel: audit: type=1400 audit(1734055199.963:811): avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:59.993951 kernel: audit: type=1300 audit(1734055199.963:811): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011f2fc0 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:59.963000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011f2fc0 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:59.998763 kernel: audit: type=1327 audit(1734055199.963:811): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:59.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:59.963000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:00.006319 kernel: audit: type=1400 audit(1734055199.963:812): avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:00.006367 kernel: audit: type=1300 audit(1734055199.963:812): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011f3160 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:59.963000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011f3160 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:00:00.011083 kernel: audit: type=1327 audit(1734055199.963:812): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:59.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:59:59.963000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:00.018640 kernel: audit: type=1400 audit(1734055199.963:813): avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:59:59.963000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c1e600 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 01:59:59.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:00:02.259606 kubelet[2076]: I1213 02:00:02.259560 2076 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:00:02.260024 env[1219]: time="2024-12-13T02:00:02.259979338Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:00:02.260245 kubelet[2076]: I1213 02:00:02.260141 2076 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:00:02.966052 kubelet[2076]: I1213 02:00:02.965994 2076 topology_manager.go:215] "Topology Admit Handler" podUID="63b96ed6-e45c-4122-b522-0ac9803e1eff" podNamespace="kube-system" podName="kube-proxy-f7t8l" Dec 13 02:00:02.970982 systemd[1]: Created slice kubepods-besteffort-pod63b96ed6_e45c_4122_b522_0ac9803e1eff.slice. Dec 13 02:00:02.983894 kubelet[2076]: I1213 02:00:02.983853 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/63b96ed6-e45c-4122-b522-0ac9803e1eff-xtables-lock\") pod \"kube-proxy-f7t8l\" (UID: \"63b96ed6-e45c-4122-b522-0ac9803e1eff\") " pod="kube-system/kube-proxy-f7t8l" Dec 13 02:00:02.983996 kubelet[2076]: I1213 02:00:02.983897 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/63b96ed6-e45c-4122-b522-0ac9803e1eff-lib-modules\") pod \"kube-proxy-f7t8l\" (UID: \"63b96ed6-e45c-4122-b522-0ac9803e1eff\") " pod="kube-system/kube-proxy-f7t8l" Dec 13 02:00:02.983996 kubelet[2076]: I1213 02:00:02.983914 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7q2x9\" (UniqueName: \"kubernetes.io/projected/63b96ed6-e45c-4122-b522-0ac9803e1eff-kube-api-access-7q2x9\") pod \"kube-proxy-f7t8l\" (UID: \"63b96ed6-e45c-4122-b522-0ac9803e1eff\") " pod="kube-system/kube-proxy-f7t8l" Dec 13 02:00:02.983996 kubelet[2076]: I1213 02:00:02.983942 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/63b96ed6-e45c-4122-b522-0ac9803e1eff-kube-proxy\") pod \"kube-proxy-f7t8l\" (UID: \"63b96ed6-e45c-4122-b522-0ac9803e1eff\") " pod="kube-system/kube-proxy-f7t8l" Dec 13 02:00:03.278279 kubelet[2076]: E1213 02:00:03.278175 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:03.278633 env[1219]: time="2024-12-13T02:00:03.278579364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-f7t8l,Uid:63b96ed6-e45c-4122-b522-0ac9803e1eff,Namespace:kube-system,Attempt:0,}" Dec 13 02:00:03.522631 env[1219]: time="2024-12-13T02:00:03.522567035Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:00:03.522631 env[1219]: time="2024-12-13T02:00:03.522603173Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:00:03.522631 env[1219]: time="2024-12-13T02:00:03.522613051Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:00:03.524244 env[1219]: time="2024-12-13T02:00:03.522879964Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b0d03a0bb7c9153c0e2bcabd6e919e1e51139edb1aeb55fbcaa175c79b3bb268 pid=2172 runtime=io.containerd.runc.v2 Dec 13 02:00:03.532873 kubelet[2076]: I1213 02:00:03.532770 2076 topology_manager.go:215] "Topology Admit Handler" podUID="221512fc-08af-4bda-991a-293e9f536061" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-2v5v9" Dec 13 02:00:03.541432 systemd[1]: Created slice kubepods-besteffort-pod221512fc_08af_4bda_991a_293e9f536061.slice. Dec 13 02:00:03.546541 systemd[1]: Started cri-containerd-b0d03a0bb7c9153c0e2bcabd6e919e1e51139edb1aeb55fbcaa175c79b3bb268.scope. Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.554000 audit: BPF prog-id=100 op=LOAD Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230643033613062623763393135336330653262636162643665393139 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230643033613062623763393135336330653262636162643665393139 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit: BPF prog-id=101 op=LOAD Dec 13 02:00:03.555000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032f140 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230643033613062623763393135336330653262636162643665393139 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit: BPF prog-id=102 op=LOAD Dec 13 02:00:03.555000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032f188 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230643033613062623763393135336330653262636162643665393139 Dec 13 02:00:03.555000 audit: BPF prog-id=102 op=UNLOAD Dec 13 02:00:03.555000 audit: BPF prog-id=101 op=UNLOAD Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.555000 audit: BPF prog-id=103 op=LOAD Dec 13 02:00:03.555000 audit[2182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032f598 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230643033613062623763393135336330653262636162643665393139 Dec 13 02:00:03.566397 env[1219]: time="2024-12-13T02:00:03.566354263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-f7t8l,Uid:63b96ed6-e45c-4122-b522-0ac9803e1eff,Namespace:kube-system,Attempt:0,} returns sandbox id \"b0d03a0bb7c9153c0e2bcabd6e919e1e51139edb1aeb55fbcaa175c79b3bb268\"" Dec 13 02:00:03.567429 kubelet[2076]: E1213 02:00:03.567006 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:03.569490 env[1219]: time="2024-12-13T02:00:03.569459109Z" level=info msg="CreateContainer within sandbox \"b0d03a0bb7c9153c0e2bcabd6e919e1e51139edb1aeb55fbcaa175c79b3bb268\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:00:03.588457 env[1219]: time="2024-12-13T02:00:03.588412457Z" level=info msg="CreateContainer within sandbox \"b0d03a0bb7c9153c0e2bcabd6e919e1e51139edb1aeb55fbcaa175c79b3bb268\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"77601fd8fe05ed73ac6bb2760591e8b69384339e5dd30ef7327dbe6272aec6fe\"" Dec 13 02:00:03.589011 env[1219]: time="2024-12-13T02:00:03.588979795Z" level=info msg="StartContainer for \"77601fd8fe05ed73ac6bb2760591e8b69384339e5dd30ef7327dbe6272aec6fe\"" Dec 13 02:00:03.601699 systemd[1]: Started cri-containerd-77601fd8fe05ed73ac6bb2760591e8b69384339e5dd30ef7327dbe6272aec6fe.scope. Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc1a7733cc8 items=0 ppid=2172 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737363031666438666530356564373361633662623237363035393165 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit: BPF prog-id=104 op=LOAD Dec 13 02:00:03.614000 audit[2213]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00027bc58 items=0 ppid=2172 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737363031666438666530356564373361633662623237363035393165 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit: BPF prog-id=105 op=LOAD Dec 13 02:00:03.614000 audit[2213]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00027bca8 items=0 ppid=2172 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737363031666438666530356564373361633662623237363035393165 Dec 13 02:00:03.614000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:00:03.614000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.614000 audit: BPF prog-id=106 op=LOAD Dec 13 02:00:03.614000 audit[2213]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00027bd38 items=0 ppid=2172 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737363031666438666530356564373361633662623237363035393165 Dec 13 02:00:03.628969 env[1219]: time="2024-12-13T02:00:03.628916694Z" level=info msg="StartContainer for \"77601fd8fe05ed73ac6bb2760591e8b69384339e5dd30ef7327dbe6272aec6fe\" returns successfully" Dec 13 02:00:03.675000 audit[2268]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.675000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2edea850 a2=0 a3=7ffd2edea83c items=0 ppid=2224 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:00:03.675000 audit[2267]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.675000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb6ba44f0 a2=0 a3=7ffcb6ba44dc items=0 ppid=2224 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:00:03.676000 audit[2270]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.676000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb5d8e920 a2=0 a3=7ffdb5d8e90c items=0 ppid=2224 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:00:03.677000 audit[2271]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.677000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe08bbc0e0 a2=0 a3=7ffe08bbc0cc items=0 ppid=2224 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:00:03.677000 audit[2272]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.677000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef487c4a0 a2=0 a3=7ffef487c48c items=0 ppid=2224 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:00:03.679000 audit[2273]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.679000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd63bd0520 a2=0 a3=7ffd63bd050c items=0 ppid=2224 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:00:03.689082 kubelet[2076]: I1213 02:00:03.689061 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/221512fc-08af-4bda-991a-293e9f536061-var-lib-calico\") pod \"tigera-operator-7bc55997bb-2v5v9\" (UID: \"221512fc-08af-4bda-991a-293e9f536061\") " pod="tigera-operator/tigera-operator-7bc55997bb-2v5v9" Dec 13 02:00:03.689082 kubelet[2076]: I1213 02:00:03.689088 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-45kff\" (UniqueName: \"kubernetes.io/projected/221512fc-08af-4bda-991a-293e9f536061-kube-api-access-45kff\") pod \"tigera-operator-7bc55997bb-2v5v9\" (UID: \"221512fc-08af-4bda-991a-293e9f536061\") " pod="tigera-operator/tigera-operator-7bc55997bb-2v5v9" Dec 13 02:00:03.776000 audit[2274]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.776000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd4038a650 a2=0 a3=7ffd4038a63c items=0 ppid=2224 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.776000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:00:03.778000 audit[2276]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.778000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd25549490 a2=0 a3=7ffd2554947c items=0 ppid=2224 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.778000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:00:03.781000 audit[2279]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.781000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeaacd3510 a2=0 a3=7ffeaacd34fc items=0 ppid=2224 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:00:03.782000 audit[2280]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.782000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcae3ae0c0 a2=0 a3=7ffcae3ae0ac items=0 ppid=2224 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:00:03.785000 audit[2282]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.785000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc7313f30 a2=0 a3=7ffcc7313f1c items=0 ppid=2224 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:00:03.786000 audit[2283]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.786000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc686e9ab0 a2=0 a3=7ffc686e9a9c items=0 ppid=2224 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:00:03.787000 audit[2285]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.787000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffce8c7fef0 a2=0 a3=7ffce8c7fedc items=0 ppid=2224 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:00:03.790000 audit[2288]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.790000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd04daecb0 a2=0 a3=7ffd04daec9c items=0 ppid=2224 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:00:03.791000 audit[2289]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.791000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeba010460 a2=0 a3=7ffeba01044c items=0 ppid=2224 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:00:03.793000 audit[2291]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.793000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2aed1e50 a2=0 a3=7ffc2aed1e3c items=0 ppid=2224 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:00:03.794000 audit[2292]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.794000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc14d36730 a2=0 a3=7ffc14d3671c items=0 ppid=2224 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:00:03.796000 audit[2295]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.796000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0b919470 a2=0 a3=7fff0b91945c items=0 ppid=2224 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:00:03.798000 audit[2298]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.798000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe38171290 a2=0 a3=7ffe3817127c items=0 ppid=2224 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:00:03.801000 audit[2301]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.801000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe58a234a0 a2=0 a3=7ffe58a2348c items=0 ppid=2224 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:00:03.802000 audit[2302]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.802000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc688208f0 a2=0 a3=7ffc688208dc items=0 ppid=2224 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:00:03.803000 audit[2304]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.803000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdb4f26e80 a2=0 a3=7ffdb4f26e6c items=0 ppid=2224 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:00:03.806000 audit[2307]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.806000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9ca48800 a2=0 a3=7ffd9ca487ec items=0 ppid=2224 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:00:03.807000 audit[2308]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.807000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff02b0b7b0 a2=0 a3=7fff02b0b79c items=0 ppid=2224 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:00:03.808000 audit[2310]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:00:03.808000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffcc8aeec10 a2=0 a3=7ffcc8aeebfc items=0 ppid=2224 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:00:03.824000 audit[2316]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:03.824000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff9de06fc0 a2=0 a3=7fff9de06fac items=0 ppid=2224 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:03.835000 audit[2316]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:03.835000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff9de06fc0 a2=0 a3=7fff9de06fac items=0 ppid=2224 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:03.836000 audit[2322]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.836000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe9ecb8b80 a2=0 a3=7ffe9ecb8b6c items=0 ppid=2224 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:00:03.837000 audit[2324]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.837000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffef977b3d0 a2=0 a3=7ffef977b3bc items=0 ppid=2224 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:00:03.840000 audit[2327]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.840000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde20f6f10 a2=0 a3=7ffde20f6efc items=0 ppid=2224 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:00:03.841000 audit[2328]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.841000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc33c250c0 a2=0 a3=7ffc33c250ac items=0 ppid=2224 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:00:03.844225 env[1219]: time="2024-12-13T02:00:03.844189767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-2v5v9,Uid:221512fc-08af-4bda-991a-293e9f536061,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:00:03.843000 audit[2330]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.843000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc88520150 a2=0 a3=7ffc8852013c items=0 ppid=2224 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:00:03.844000 audit[2331]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.844000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeca056770 a2=0 a3=7ffeca05675c items=0 ppid=2224 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:00:03.845000 audit[2333]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.845000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe71dce7d0 a2=0 a3=7ffe71dce7bc items=0 ppid=2224 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:00:03.848000 audit[2336]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.848000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc438e71b0 a2=0 a3=7ffc438e719c items=0 ppid=2224 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:00:03.849000 audit[2337]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.849000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe28a70160 a2=0 a3=7ffe28a7014c items=0 ppid=2224 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:00:03.851000 audit[2339]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.851000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc38ef5cf0 a2=0 a3=7ffc38ef5cdc items=0 ppid=2224 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:00:03.852000 audit[2340]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.852000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff35ba7120 a2=0 a3=7fff35ba710c items=0 ppid=2224 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:00:03.854000 audit[2342]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.854000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff8da12410 a2=0 a3=7fff8da123fc items=0 ppid=2224 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.854000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:00:03.857000 audit[2357]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.857000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbf54a450 a2=0 a3=7fffbf54a43c items=0 ppid=2224 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:00:03.860014 env[1219]: time="2024-12-13T02:00:03.859877657Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:00:03.860094 env[1219]: time="2024-12-13T02:00:03.860022279Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:00:03.860094 env[1219]: time="2024-12-13T02:00:03.860044651Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:00:03.860344 env[1219]: time="2024-12-13T02:00:03.860283902Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0154cebce21c0804d6506f5b8fdf0794f3e565b7666a307aa3bb007f5ade7dec pid=2352 runtime=io.containerd.runc.v2 Dec 13 02:00:03.860000 audit[2366]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.860000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc07d46f60 a2=0 a3=7ffc07d46f4c items=0 ppid=2224 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:00:03.861000 audit[2367]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.861000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe84f31c0 a2=0 a3=7fffe84f31ac items=0 ppid=2224 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:00:03.863000 audit[2373]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.863000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc5fe78650 a2=0 a3=7ffc5fe7863c items=0 ppid=2224 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:00:03.865000 audit[2381]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.865000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdff520cf0 a2=0 a3=7ffdff520cdc items=0 ppid=2224 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:00:03.866000 audit[2382]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.866000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8fa73340 a2=0 a3=7ffc8fa7332c items=0 ppid=2224 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:00:03.869000 audit[2385]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.869000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe1c96f5a0 a2=0 a3=7ffe1c96f58c items=0 ppid=2224 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:00:03.871660 systemd[1]: Started cri-containerd-0154cebce21c0804d6506f5b8fdf0794f3e565b7666a307aa3bb007f5ade7dec.scope. Dec 13 02:00:03.870000 audit[2386]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.870000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd33f45cc0 a2=0 a3=7ffd33f45cac items=0 ppid=2224 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:00:03.872000 audit[2388]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.872000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff54935060 a2=0 a3=7fff5493504c items=0 ppid=2224 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.872000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:00:03.875000 audit[2398]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:00:03.875000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea1c46c90 a2=0 a3=7ffea1c46c7c items=0 ppid=2224 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:00:03.877000 audit[2400]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:00:03.877000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc91e083c0 a2=0 a3=7ffc91e083ac items=0 ppid=2224 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.877000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:03.877000 audit[2400]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:00:03.877000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc91e083c0 a2=0 a3=7ffc91e083ac items=0 ppid=2224 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.877000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:03.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit: BPF prog-id=107 op=LOAD Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=2352 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031353463656263653231633038303464363530366635623866646630 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=2352 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031353463656263653231633038303464363530366635623866646630 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit: BPF prog-id=108 op=LOAD Dec 13 02:00:03.880000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001199d8 a2=78 a3=c00030ecf0 items=0 ppid=2352 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031353463656263653231633038303464363530366635623866646630 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit: BPF prog-id=109 op=LOAD Dec 13 02:00:03.880000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000119770 a2=78 a3=c00030ed38 items=0 ppid=2352 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031353463656263653231633038303464363530366635623866646630 Dec 13 02:00:03.880000 audit: BPF prog-id=109 op=UNLOAD Dec 13 02:00:03.880000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:03.880000 audit: BPF prog-id=110 op=LOAD Dec 13 02:00:03.880000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000119c30 a2=78 a3=c00030f148 items=0 ppid=2352 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:03.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031353463656263653231633038303464363530366635623866646630 Dec 13 02:00:03.904650 env[1219]: time="2024-12-13T02:00:03.904608571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-2v5v9,Uid:221512fc-08af-4bda-991a-293e9f536061,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0154cebce21c0804d6506f5b8fdf0794f3e565b7666a307aa3bb007f5ade7dec\"" Dec 13 02:00:03.908043 env[1219]: time="2024-12-13T02:00:03.907632385Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:00:04.234143 kubelet[2076]: E1213 02:00:04.234114 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:04.241661 kubelet[2076]: I1213 02:00:04.241608 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-f7t8l" podStartSLOduration=2.241595405 podStartE2EDuration="2.241595405s" podCreationTimestamp="2024-12-13 02:00:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:00:04.241293958 +0000 UTC m=+16.118343647" watchObservedRunningTime="2024-12-13 02:00:04.241595405 +0000 UTC m=+16.118645074" Dec 13 02:00:10.761355 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3052055412.mount: Deactivated successfully. Dec 13 02:00:11.384485 env[1219]: time="2024-12-13T02:00:11.384439624Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:11.386490 env[1219]: time="2024-12-13T02:00:11.386469751Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:11.387954 env[1219]: time="2024-12-13T02:00:11.387899298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:11.389309 env[1219]: time="2024-12-13T02:00:11.389279173Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:11.389767 env[1219]: time="2024-12-13T02:00:11.389737665Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:00:11.392154 env[1219]: time="2024-12-13T02:00:11.392114293Z" level=info msg="CreateContainer within sandbox \"0154cebce21c0804d6506f5b8fdf0794f3e565b7666a307aa3bb007f5ade7dec\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:00:11.403237 env[1219]: time="2024-12-13T02:00:11.403198872Z" level=info msg="CreateContainer within sandbox \"0154cebce21c0804d6506f5b8fdf0794f3e565b7666a307aa3bb007f5ade7dec\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"0fc49ab95e9b5387998d66c9086db675c37818cb258610e19982b7033075bc99\"" Dec 13 02:00:11.403629 env[1219]: time="2024-12-13T02:00:11.403592603Z" level=info msg="StartContainer for \"0fc49ab95e9b5387998d66c9086db675c37818cb258610e19982b7033075bc99\"" Dec 13 02:00:11.416926 systemd[1]: Started cri-containerd-0fc49ab95e9b5387998d66c9086db675c37818cb258610e19982b7033075bc99.scope. Dec 13 02:00:11.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.428342 kernel: kauditd_printk_skb: 312 callbacks suppressed Dec 13 02:00:11.428458 kernel: audit: type=1400 audit(1734055211.426:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.434036 kernel: audit: type=1400 audit(1734055211.426:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.437014 kernel: audit: type=1400 audit(1734055211.426:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.437059 kernel: audit: type=1400 audit(1734055211.426:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.439911 kernel: audit: type=1400 audit(1734055211.426:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.442792 kernel: audit: type=1400 audit(1734055211.426:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.445700 kernel: audit: type=1400 audit(1734055211.426:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.451545 kernel: audit: type=1400 audit(1734055211.426:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.451588 kernel: audit: type=1400 audit(1734055211.426:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.457236 kernel: audit: type=1400 audit(1734055211.430:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.430000 audit: BPF prog-id=111 op=LOAD Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2352 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:11.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633439616239356539623533383739393864363663393038366462 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2352 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:11.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633439616239356539623533383739393864363663393038366462 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.431000 audit: BPF prog-id=112 op=LOAD Dec 13 02:00:11.431000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001df6f0 items=0 ppid=2352 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:11.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633439616239356539623533383739393864363663393038366462 Dec 13 02:00:11.436000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.436000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.436000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.436000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.436000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.436000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.436000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.436000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.436000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.436000 audit: BPF prog-id=113 op=LOAD Dec 13 02:00:11.436000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001df738 items=0 ppid=2352 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:11.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633439616239356539623533383739393864363663393038366462 Dec 13 02:00:11.441000 audit: BPF prog-id=113 op=UNLOAD Dec 13 02:00:11.441000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:11.441000 audit: BPF prog-id=114 op=LOAD Dec 13 02:00:11.441000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dfb48 items=0 ppid=2352 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:11.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066633439616239356539623533383739393864363663393038366462 Dec 13 02:00:11.473090 env[1219]: time="2024-12-13T02:00:11.473034214Z" level=info msg="StartContainer for \"0fc49ab95e9b5387998d66c9086db675c37818cb258610e19982b7033075bc99\" returns successfully" Dec 13 02:00:12.251484 kubelet[2076]: I1213 02:00:12.251417 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-2v5v9" podStartSLOduration=1.766485802 podStartE2EDuration="9.251404026s" podCreationTimestamp="2024-12-13 02:00:03 +0000 UTC" firstStartedPulling="2024-12-13 02:00:03.905507815 +0000 UTC m=+15.782557484" lastFinishedPulling="2024-12-13 02:00:11.390426039 +0000 UTC m=+23.267475708" observedRunningTime="2024-12-13 02:00:12.251191195 +0000 UTC m=+24.128240855" watchObservedRunningTime="2024-12-13 02:00:12.251404026 +0000 UTC m=+24.128453695" Dec 13 02:00:14.124000 audit[2448]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:14.124000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffde0622420 a2=0 a3=7ffde062240c items=0 ppid=2224 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:14.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:14.128000 audit[2448]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:14.128000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffde0622420 a2=0 a3=0 items=0 ppid=2224 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:14.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:14.136000 audit[2450]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:14.136000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd905b38a0 a2=0 a3=7ffd905b388c items=0 ppid=2224 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:14.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:14.140000 audit[2450]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:14.140000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd905b38a0 a2=0 a3=0 items=0 ppid=2224 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:14.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:14.248581 kubelet[2076]: I1213 02:00:14.248530 2076 topology_manager.go:215] "Topology Admit Handler" podUID="75f34dac-f0fa-4ceb-adf3-56997f33fa8d" podNamespace="calico-system" podName="calico-typha-5569976574-k54lk" Dec 13 02:00:14.254790 systemd[1]: Created slice kubepods-besteffort-pod75f34dac_f0fa_4ceb_adf3_56997f33fa8d.slice. Dec 13 02:00:14.258592 kubelet[2076]: W1213 02:00:14.258554 2076 reflector.go:547] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:00:14.258592 kubelet[2076]: E1213 02:00:14.258588 2076 reflector.go:150] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:00:14.258780 kubelet[2076]: W1213 02:00:14.258614 2076 reflector.go:547] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:00:14.258780 kubelet[2076]: E1213 02:00:14.258623 2076 reflector.go:150] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:00:14.258780 kubelet[2076]: W1213 02:00:14.258643 2076 reflector.go:547] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:00:14.258780 kubelet[2076]: E1213 02:00:14.258649 2076 reflector.go:150] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:00:14.311894 kubelet[2076]: I1213 02:00:14.311838 2076 topology_manager.go:215] "Topology Admit Handler" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" podNamespace="calico-system" podName="calico-node-pf9vh" Dec 13 02:00:14.317362 systemd[1]: Created slice kubepods-besteffort-pod22e01492_f5d8_4cd0_a5e3_8866ada8945d.slice. Dec 13 02:00:14.409076 kubelet[2076]: I1213 02:00:14.408947 2076 topology_manager.go:215] "Topology Admit Handler" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" podNamespace="calico-system" podName="csi-node-driver-v75ck" Dec 13 02:00:14.409220 kubelet[2076]: E1213 02:00:14.409198 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:14.445540 kubelet[2076]: I1213 02:00:14.445488 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/22e01492-f5d8-4cd0-a5e3-8866ada8945d-node-certs\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.445540 kubelet[2076]: I1213 02:00:14.445535 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-bin-dir\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.445760 kubelet[2076]: I1213 02:00:14.445553 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/75f34dac-f0fa-4ceb-adf3-56997f33fa8d-tigera-ca-bundle\") pod \"calico-typha-5569976574-k54lk\" (UID: \"75f34dac-f0fa-4ceb-adf3-56997f33fa8d\") " pod="calico-system/calico-typha-5569976574-k54lk" Dec 13 02:00:14.445760 kubelet[2076]: I1213 02:00:14.445572 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-policysync\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.445760 kubelet[2076]: I1213 02:00:14.445591 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-log-dir\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.445760 kubelet[2076]: I1213 02:00:14.445607 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-flexvol-driver-host\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.445760 kubelet[2076]: I1213 02:00:14.445622 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-var-lib-calico\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.445957 kubelet[2076]: I1213 02:00:14.445641 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-net-dir\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.445957 kubelet[2076]: I1213 02:00:14.445654 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/75f34dac-f0fa-4ceb-adf3-56997f33fa8d-typha-certs\") pod \"calico-typha-5569976574-k54lk\" (UID: \"75f34dac-f0fa-4ceb-adf3-56997f33fa8d\") " pod="calico-system/calico-typha-5569976574-k54lk" Dec 13 02:00:14.445957 kubelet[2076]: I1213 02:00:14.445668 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-var-run-calico\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.445957 kubelet[2076]: I1213 02:00:14.445684 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-xtables-lock\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.445957 kubelet[2076]: I1213 02:00:14.445697 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/22e01492-f5d8-4cd0-a5e3-8866ada8945d-tigera-ca-bundle\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.446130 kubelet[2076]: I1213 02:00:14.445710 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wvl4s\" (UniqueName: \"kubernetes.io/projected/22e01492-f5d8-4cd0-a5e3-8866ada8945d-kube-api-access-wvl4s\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.446130 kubelet[2076]: I1213 02:00:14.445723 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cq7jp\" (UniqueName: \"kubernetes.io/projected/75f34dac-f0fa-4ceb-adf3-56997f33fa8d-kube-api-access-cq7jp\") pod \"calico-typha-5569976574-k54lk\" (UID: \"75f34dac-f0fa-4ceb-adf3-56997f33fa8d\") " pod="calico-system/calico-typha-5569976574-k54lk" Dec 13 02:00:14.446130 kubelet[2076]: I1213 02:00:14.445736 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-lib-modules\") pod \"calico-node-pf9vh\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " pod="calico-system/calico-node-pf9vh" Dec 13 02:00:14.545992 kubelet[2076]: I1213 02:00:14.545948 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2bd5041f-f9cd-42cf-a423-3f4b7c4eecee-socket-dir\") pod \"csi-node-driver-v75ck\" (UID: \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\") " pod="calico-system/csi-node-driver-v75ck" Dec 13 02:00:14.546154 kubelet[2076]: I1213 02:00:14.546011 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xpvnl\" (UniqueName: \"kubernetes.io/projected/2bd5041f-f9cd-42cf-a423-3f4b7c4eecee-kube-api-access-xpvnl\") pod \"csi-node-driver-v75ck\" (UID: \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\") " pod="calico-system/csi-node-driver-v75ck" Dec 13 02:00:14.546154 kubelet[2076]: I1213 02:00:14.546048 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2bd5041f-f9cd-42cf-a423-3f4b7c4eecee-varrun\") pod \"csi-node-driver-v75ck\" (UID: \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\") " pod="calico-system/csi-node-driver-v75ck" Dec 13 02:00:14.546154 kubelet[2076]: I1213 02:00:14.546062 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2bd5041f-f9cd-42cf-a423-3f4b7c4eecee-kubelet-dir\") pod \"csi-node-driver-v75ck\" (UID: \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\") " pod="calico-system/csi-node-driver-v75ck" Dec 13 02:00:14.546154 kubelet[2076]: I1213 02:00:14.546078 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2bd5041f-f9cd-42cf-a423-3f4b7c4eecee-registration-dir\") pod \"csi-node-driver-v75ck\" (UID: \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\") " pod="calico-system/csi-node-driver-v75ck" Dec 13 02:00:14.547034 kubelet[2076]: E1213 02:00:14.546998 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.547034 kubelet[2076]: W1213 02:00:14.547020 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.547215 kubelet[2076]: E1213 02:00:14.547051 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.547326 kubelet[2076]: E1213 02:00:14.547295 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.547371 kubelet[2076]: W1213 02:00:14.547326 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.547371 kubelet[2076]: E1213 02:00:14.547355 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.547658 kubelet[2076]: E1213 02:00:14.547625 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.547658 kubelet[2076]: W1213 02:00:14.547640 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.547658 kubelet[2076]: E1213 02:00:14.547649 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.547914 kubelet[2076]: E1213 02:00:14.547876 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.547914 kubelet[2076]: W1213 02:00:14.547891 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.547914 kubelet[2076]: E1213 02:00:14.547902 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.554361 kubelet[2076]: E1213 02:00:14.554338 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.554361 kubelet[2076]: W1213 02:00:14.554356 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.554485 kubelet[2076]: E1213 02:00:14.554370 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.647595 kubelet[2076]: E1213 02:00:14.647557 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.647595 kubelet[2076]: W1213 02:00:14.647576 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.647595 kubelet[2076]: E1213 02:00:14.647595 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.647817 kubelet[2076]: E1213 02:00:14.647803 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.647817 kubelet[2076]: W1213 02:00:14.647813 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.647866 kubelet[2076]: E1213 02:00:14.647820 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.648021 kubelet[2076]: E1213 02:00:14.647999 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.648021 kubelet[2076]: W1213 02:00:14.648009 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.648021 kubelet[2076]: E1213 02:00:14.648015 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.648134 kubelet[2076]: E1213 02:00:14.648122 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.648134 kubelet[2076]: W1213 02:00:14.648131 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.648181 kubelet[2076]: E1213 02:00:14.648137 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.648300 kubelet[2076]: E1213 02:00:14.648284 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.648300 kubelet[2076]: W1213 02:00:14.648295 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.648376 kubelet[2076]: E1213 02:00:14.648304 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.648489 kubelet[2076]: E1213 02:00:14.648466 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.648489 kubelet[2076]: W1213 02:00:14.648478 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.648489 kubelet[2076]: E1213 02:00:14.648487 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.648724 kubelet[2076]: E1213 02:00:14.648693 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.648724 kubelet[2076]: W1213 02:00:14.648716 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.648890 kubelet[2076]: E1213 02:00:14.648748 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.648980 kubelet[2076]: E1213 02:00:14.648968 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.648980 kubelet[2076]: W1213 02:00:14.648977 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.649027 kubelet[2076]: E1213 02:00:14.648990 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.649230 kubelet[2076]: E1213 02:00:14.649196 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.649230 kubelet[2076]: W1213 02:00:14.649222 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.649285 kubelet[2076]: E1213 02:00:14.649248 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.649402 kubelet[2076]: E1213 02:00:14.649387 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.649402 kubelet[2076]: W1213 02:00:14.649396 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.649480 kubelet[2076]: E1213 02:00:14.649407 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.649570 kubelet[2076]: E1213 02:00:14.649555 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.649570 kubelet[2076]: W1213 02:00:14.649566 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.649620 kubelet[2076]: E1213 02:00:14.649579 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.649826 kubelet[2076]: E1213 02:00:14.649807 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.649826 kubelet[2076]: W1213 02:00:14.649820 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.649882 kubelet[2076]: E1213 02:00:14.649833 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.650005 kubelet[2076]: E1213 02:00:14.649996 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.650005 kubelet[2076]: W1213 02:00:14.650003 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.650056 kubelet[2076]: E1213 02:00:14.650014 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.650164 kubelet[2076]: E1213 02:00:14.650156 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.650190 kubelet[2076]: W1213 02:00:14.650164 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.650216 kubelet[2076]: E1213 02:00:14.650188 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.650304 kubelet[2076]: E1213 02:00:14.650296 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.650304 kubelet[2076]: W1213 02:00:14.650303 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.650357 kubelet[2076]: E1213 02:00:14.650324 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.650478 kubelet[2076]: E1213 02:00:14.650463 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.650478 kubelet[2076]: W1213 02:00:14.650472 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.650677 kubelet[2076]: E1213 02:00:14.650498 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.650677 kubelet[2076]: E1213 02:00:14.650632 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.650677 kubelet[2076]: W1213 02:00:14.650639 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.650677 kubelet[2076]: E1213 02:00:14.650652 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.650839 kubelet[2076]: E1213 02:00:14.650824 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.650839 kubelet[2076]: W1213 02:00:14.650836 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.650886 kubelet[2076]: E1213 02:00:14.650852 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.651088 kubelet[2076]: E1213 02:00:14.651072 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.651088 kubelet[2076]: W1213 02:00:14.651084 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.651159 kubelet[2076]: E1213 02:00:14.651097 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.651290 kubelet[2076]: E1213 02:00:14.651274 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.651290 kubelet[2076]: W1213 02:00:14.651288 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.651359 kubelet[2076]: E1213 02:00:14.651303 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.651480 kubelet[2076]: E1213 02:00:14.651467 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.651480 kubelet[2076]: W1213 02:00:14.651478 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.651533 kubelet[2076]: E1213 02:00:14.651490 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.651663 kubelet[2076]: E1213 02:00:14.651652 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.651663 kubelet[2076]: W1213 02:00:14.651662 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.651724 kubelet[2076]: E1213 02:00:14.651678 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.651818 kubelet[2076]: E1213 02:00:14.651803 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.651818 kubelet[2076]: W1213 02:00:14.651812 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.651881 kubelet[2076]: E1213 02:00:14.651844 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.651995 kubelet[2076]: E1213 02:00:14.651980 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.651995 kubelet[2076]: W1213 02:00:14.651989 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.652080 kubelet[2076]: E1213 02:00:14.652002 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.652178 kubelet[2076]: E1213 02:00:14.652164 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.652178 kubelet[2076]: W1213 02:00:14.652173 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.652249 kubelet[2076]: E1213 02:00:14.652183 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.652356 kubelet[2076]: E1213 02:00:14.652343 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.652356 kubelet[2076]: W1213 02:00:14.652354 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.652418 kubelet[2076]: E1213 02:00:14.652367 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.652562 kubelet[2076]: E1213 02:00:14.652547 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.652590 kubelet[2076]: W1213 02:00:14.652585 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.652613 kubelet[2076]: E1213 02:00:14.652600 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.652813 kubelet[2076]: E1213 02:00:14.652782 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.652813 kubelet[2076]: W1213 02:00:14.652795 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.652813 kubelet[2076]: E1213 02:00:14.652807 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.653073 kubelet[2076]: E1213 02:00:14.652974 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.653073 kubelet[2076]: W1213 02:00:14.652980 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.653073 kubelet[2076]: E1213 02:00:14.652990 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.653170 kubelet[2076]: E1213 02:00:14.653114 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.653170 kubelet[2076]: W1213 02:00:14.653121 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.653170 kubelet[2076]: E1213 02:00:14.653129 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.751721 kubelet[2076]: E1213 02:00:14.751591 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.751721 kubelet[2076]: W1213 02:00:14.751613 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.751721 kubelet[2076]: E1213 02:00:14.751635 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.751985 kubelet[2076]: E1213 02:00:14.751867 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.751985 kubelet[2076]: W1213 02:00:14.751875 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.751985 kubelet[2076]: E1213 02:00:14.751882 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.752100 kubelet[2076]: E1213 02:00:14.752043 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.752100 kubelet[2076]: W1213 02:00:14.752049 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.752100 kubelet[2076]: E1213 02:00:14.752056 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.752328 kubelet[2076]: E1213 02:00:14.752276 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.752328 kubelet[2076]: W1213 02:00:14.752290 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.752328 kubelet[2076]: E1213 02:00:14.752302 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.752495 kubelet[2076]: E1213 02:00:14.752478 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.752495 kubelet[2076]: W1213 02:00:14.752490 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.752573 kubelet[2076]: E1213 02:00:14.752498 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.752703 kubelet[2076]: E1213 02:00:14.752682 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.752703 kubelet[2076]: W1213 02:00:14.752691 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.752703 kubelet[2076]: E1213 02:00:14.752699 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.853660 kubelet[2076]: E1213 02:00:14.853614 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.853660 kubelet[2076]: W1213 02:00:14.853640 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.853660 kubelet[2076]: E1213 02:00:14.853662 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.853863 kubelet[2076]: E1213 02:00:14.853839 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.853863 kubelet[2076]: W1213 02:00:14.853847 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.853863 kubelet[2076]: E1213 02:00:14.853856 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.854068 kubelet[2076]: E1213 02:00:14.854046 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.854068 kubelet[2076]: W1213 02:00:14.854060 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.854125 kubelet[2076]: E1213 02:00:14.854068 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.854248 kubelet[2076]: E1213 02:00:14.854230 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.854248 kubelet[2076]: W1213 02:00:14.854242 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.854295 kubelet[2076]: E1213 02:00:14.854251 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.854423 kubelet[2076]: E1213 02:00:14.854403 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.854423 kubelet[2076]: W1213 02:00:14.854416 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.854492 kubelet[2076]: E1213 02:00:14.854424 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.854612 kubelet[2076]: E1213 02:00:14.854592 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.854612 kubelet[2076]: W1213 02:00:14.854605 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.854661 kubelet[2076]: E1213 02:00:14.854613 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.955633 kubelet[2076]: E1213 02:00:14.955606 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.955633 kubelet[2076]: W1213 02:00:14.955621 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.955633 kubelet[2076]: E1213 02:00:14.955635 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.955796 kubelet[2076]: E1213 02:00:14.955776 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.955796 kubelet[2076]: W1213 02:00:14.955786 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.955796 kubelet[2076]: E1213 02:00:14.955793 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.955966 kubelet[2076]: E1213 02:00:14.955954 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.955966 kubelet[2076]: W1213 02:00:14.955963 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.956020 kubelet[2076]: E1213 02:00:14.955971 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.956117 kubelet[2076]: E1213 02:00:14.956106 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.956117 kubelet[2076]: W1213 02:00:14.956115 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.956164 kubelet[2076]: E1213 02:00:14.956121 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.956264 kubelet[2076]: E1213 02:00:14.956253 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.956264 kubelet[2076]: W1213 02:00:14.956262 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.956314 kubelet[2076]: E1213 02:00:14.956268 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:14.956410 kubelet[2076]: E1213 02:00:14.956399 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:14.956410 kubelet[2076]: W1213 02:00:14.956408 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:14.956462 kubelet[2076]: E1213 02:00:14.956414 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.057128 kubelet[2076]: E1213 02:00:15.057036 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.057128 kubelet[2076]: W1213 02:00:15.057047 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.057128 kubelet[2076]: E1213 02:00:15.057057 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.057422 kubelet[2076]: E1213 02:00:15.057366 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.057422 kubelet[2076]: W1213 02:00:15.057398 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.057422 kubelet[2076]: E1213 02:00:15.057406 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.057677 kubelet[2076]: E1213 02:00:15.057635 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.057677 kubelet[2076]: W1213 02:00:15.057664 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.057784 kubelet[2076]: E1213 02:00:15.057691 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.058007 kubelet[2076]: E1213 02:00:15.057992 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.058007 kubelet[2076]: W1213 02:00:15.058004 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.058076 kubelet[2076]: E1213 02:00:15.058013 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.058239 kubelet[2076]: E1213 02:00:15.058217 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.058239 kubelet[2076]: W1213 02:00:15.058230 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.058239 kubelet[2076]: E1213 02:00:15.058238 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.058410 kubelet[2076]: E1213 02:00:15.058398 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.058410 kubelet[2076]: W1213 02:00:15.058409 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.058468 kubelet[2076]: E1213 02:00:15.058418 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.150000 audit[2512]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:15.150000 audit[2512]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdc345be60 a2=0 a3=7ffdc345be4c items=0 ppid=2224 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:15.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:15.159122 kubelet[2076]: E1213 02:00:15.159098 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.159122 kubelet[2076]: W1213 02:00:15.159111 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.159122 kubelet[2076]: E1213 02:00:15.159123 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.159307 kubelet[2076]: E1213 02:00:15.159292 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.159307 kubelet[2076]: W1213 02:00:15.159302 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.159372 kubelet[2076]: E1213 02:00:15.159311 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.159496 kubelet[2076]: E1213 02:00:15.159481 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.159496 kubelet[2076]: W1213 02:00:15.159490 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.159496 kubelet[2076]: E1213 02:00:15.159499 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.159655 kubelet[2076]: E1213 02:00:15.159635 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.159655 kubelet[2076]: W1213 02:00:15.159645 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.159655 kubelet[2076]: E1213 02:00:15.159651 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.159790 kubelet[2076]: E1213 02:00:15.159779 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.159790 kubelet[2076]: W1213 02:00:15.159787 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.159840 kubelet[2076]: E1213 02:00:15.159794 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.159927 kubelet[2076]: E1213 02:00:15.159917 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.159927 kubelet[2076]: W1213 02:00:15.159925 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.159997 kubelet[2076]: E1213 02:00:15.159942 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.160000 audit[2512]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:15.160000 audit[2512]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc345be60 a2=0 a3=0 items=0 ppid=2224 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:15.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:15.178900 kubelet[2076]: E1213 02:00:15.178423 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.178900 kubelet[2076]: W1213 02:00:15.178437 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.178900 kubelet[2076]: E1213 02:00:15.178456 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.181390 kubelet[2076]: E1213 02:00:15.181376 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.181478 kubelet[2076]: W1213 02:00:15.181461 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.181567 kubelet[2076]: E1213 02:00:15.181551 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.187013 kubelet[2076]: E1213 02:00:15.186993 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.187013 kubelet[2076]: W1213 02:00:15.187003 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.187013 kubelet[2076]: E1213 02:00:15.187012 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.217749 kubelet[2076]: E1213 02:00:15.217731 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.217749 kubelet[2076]: W1213 02:00:15.217744 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.217843 kubelet[2076]: E1213 02:00:15.217756 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.219895 kubelet[2076]: E1213 02:00:15.219878 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:15.220405 env[1219]: time="2024-12-13T02:00:15.220341637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pf9vh,Uid:22e01492-f5d8-4cd0-a5e3-8866ada8945d,Namespace:calico-system,Attempt:0,}" Dec 13 02:00:15.227121 kubelet[2076]: E1213 02:00:15.227097 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.227121 kubelet[2076]: W1213 02:00:15.227115 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.227210 kubelet[2076]: E1213 02:00:15.227132 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.236147 env[1219]: time="2024-12-13T02:00:15.236071355Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:00:15.236147 env[1219]: time="2024-12-13T02:00:15.236129444Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:00:15.236253 env[1219]: time="2024-12-13T02:00:15.236143941Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:00:15.236506 env[1219]: time="2024-12-13T02:00:15.236436691Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3 pid=2533 runtime=io.containerd.runc.v2 Dec 13 02:00:15.247092 systemd[1]: Started cri-containerd-5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3.scope. Dec 13 02:00:15.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit: BPF prog-id=115 op=LOAD Dec 13 02:00:15.255000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2533 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:15.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653038656662326231613764393264636333383438653339646239 Dec 13 02:00:15.255000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.255000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2533 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:15.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653038656662326231613764393264636333383438653339646239 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit: BPF prog-id=116 op=LOAD Dec 13 02:00:15.256000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002bfce0 items=0 ppid=2533 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:15.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653038656662326231613764393264636333383438653339646239 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.256000 audit: BPF prog-id=117 op=LOAD Dec 13 02:00:15.256000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002bfd28 items=0 ppid=2533 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:15.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653038656662326231613764393264636333383438653339646239 Dec 13 02:00:15.257000 audit: BPF prog-id=117 op=UNLOAD Dec 13 02:00:15.257000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:15.257000 audit: BPF prog-id=118 op=LOAD Dec 13 02:00:15.257000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00032c138 items=0 ppid=2533 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:15.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653038656662326231613764393264636333383438653339646239 Dec 13 02:00:15.260615 kubelet[2076]: E1213 02:00:15.260591 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.260615 kubelet[2076]: W1213 02:00:15.260610 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.260867 kubelet[2076]: E1213 02:00:15.260627 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.267224 env[1219]: time="2024-12-13T02:00:15.267175560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pf9vh,Uid:22e01492-f5d8-4cd0-a5e3-8866ada8945d,Namespace:calico-system,Attempt:0,} returns sandbox id \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\"" Dec 13 02:00:15.267953 kubelet[2076]: E1213 02:00:15.267889 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:15.269494 env[1219]: time="2024-12-13T02:00:15.269463379Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:00:15.361628 kubelet[2076]: E1213 02:00:15.361507 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.361628 kubelet[2076]: W1213 02:00:15.361530 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.361628 kubelet[2076]: E1213 02:00:15.361550 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.462686 kubelet[2076]: E1213 02:00:15.462632 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.462686 kubelet[2076]: W1213 02:00:15.462660 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.462686 kubelet[2076]: E1213 02:00:15.462679 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.547344 kubelet[2076]: E1213 02:00:15.547290 2076 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 02:00:15.547545 kubelet[2076]: E1213 02:00:15.547381 2076 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/75f34dac-f0fa-4ceb-adf3-56997f33fa8d-typha-certs podName:75f34dac-f0fa-4ceb-adf3-56997f33fa8d nodeName:}" failed. No retries permitted until 2024-12-13 02:00:16.04736152 +0000 UTC m=+27.924411189 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/75f34dac-f0fa-4ceb-adf3-56997f33fa8d-typha-certs") pod "calico-typha-5569976574-k54lk" (UID: "75f34dac-f0fa-4ceb-adf3-56997f33fa8d") : failed to sync secret cache: timed out waiting for the condition Dec 13 02:00:15.563263 kubelet[2076]: E1213 02:00:15.563232 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.563263 kubelet[2076]: W1213 02:00:15.563251 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.563450 kubelet[2076]: E1213 02:00:15.563269 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.664091 kubelet[2076]: E1213 02:00:15.664054 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.664091 kubelet[2076]: W1213 02:00:15.664075 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.664091 kubelet[2076]: E1213 02:00:15.664093 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.765324 kubelet[2076]: E1213 02:00:15.765273 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.765324 kubelet[2076]: W1213 02:00:15.765298 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.765324 kubelet[2076]: E1213 02:00:15.765317 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.866091 kubelet[2076]: E1213 02:00:15.866048 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.866091 kubelet[2076]: W1213 02:00:15.866071 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.866091 kubelet[2076]: E1213 02:00:15.866088 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:15.967110 kubelet[2076]: E1213 02:00:15.966992 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:15.967110 kubelet[2076]: W1213 02:00:15.967014 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:15.967110 kubelet[2076]: E1213 02:00:15.967035 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:16.068064 kubelet[2076]: E1213 02:00:16.068036 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:16.068064 kubelet[2076]: W1213 02:00:16.068051 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:16.068064 kubelet[2076]: E1213 02:00:16.068063 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:16.068337 kubelet[2076]: E1213 02:00:16.068321 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:16.068337 kubelet[2076]: W1213 02:00:16.068331 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:16.068337 kubelet[2076]: E1213 02:00:16.068338 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:16.068512 kubelet[2076]: E1213 02:00:16.068491 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:16.068512 kubelet[2076]: W1213 02:00:16.068501 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:16.068512 kubelet[2076]: E1213 02:00:16.068509 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:16.068643 kubelet[2076]: E1213 02:00:16.068628 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:16.068643 kubelet[2076]: W1213 02:00:16.068638 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:16.068643 kubelet[2076]: E1213 02:00:16.068644 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:16.068803 kubelet[2076]: E1213 02:00:16.068789 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:16.068803 kubelet[2076]: W1213 02:00:16.068798 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:16.068803 kubelet[2076]: E1213 02:00:16.068804 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:16.073647 kubelet[2076]: E1213 02:00:16.073627 2076 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:00:16.073647 kubelet[2076]: W1213 02:00:16.073642 2076 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:00:16.073732 kubelet[2076]: E1213 02:00:16.073652 2076 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:00:16.196144 kubelet[2076]: E1213 02:00:16.196107 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:16.357965 kubelet[2076]: E1213 02:00:16.357850 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:16.358258 env[1219]: time="2024-12-13T02:00:16.358219190Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5569976574-k54lk,Uid:75f34dac-f0fa-4ceb-adf3-56997f33fa8d,Namespace:calico-system,Attempt:0,}" Dec 13 02:00:16.527541 env[1219]: time="2024-12-13T02:00:16.527477097Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:00:16.527541 env[1219]: time="2024-12-13T02:00:16.527513214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:00:16.527541 env[1219]: time="2024-12-13T02:00:16.527523133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:00:16.527989 env[1219]: time="2024-12-13T02:00:16.527909298Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d777d4500ad814cecde39f5bfd91deceef750cfee6d82f18b506e0f5e0be419e pid=2586 runtime=io.containerd.runc.v2 Dec 13 02:00:16.543511 systemd[1]: Started cri-containerd-d777d4500ad814cecde39f5bfd91deceef750cfee6d82f18b506e0f5e0be419e.scope. Dec 13 02:00:16.551514 systemd[1]: run-containerd-runc-k8s.io-d777d4500ad814cecde39f5bfd91deceef750cfee6d82f18b506e0f5e0be419e-runc.H16CoY.mount: Deactivated successfully. Dec 13 02:00:16.558963 kernel: kauditd_printk_skb: 122 callbacks suppressed Dec 13 02:00:16.559020 kernel: audit: type=1400 audit(1734055216.552:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.559043 kernel: audit: type=1400 audit(1734055216.552:950): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.560608 kernel: audit: type=1400 audit(1734055216.552:951): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.563842 kernel: audit: type=1400 audit(1734055216.552:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.570194 kernel: audit: type=1400 audit(1734055216.552:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.570239 kernel: audit: type=1400 audit(1734055216.552:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.576591 kernel: audit: type=1400 audit(1734055216.552:955): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.576632 kernel: audit: type=1400 audit(1734055216.552:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.583281 kernel: audit: type=1400 audit(1734055216.552:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.583321 kernel: audit: type=1400 audit(1734055216.553:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit: BPF prog-id=119 op=LOAD Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:16.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373764343530306164383134636563646533396635626664393164 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:16.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373764343530306164383134636563646533396635626664393164 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.553000 audit: BPF prog-id=120 op=LOAD Dec 13 02:00:16.553000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a9d90 items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:16.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373764343530306164383134636563646533396635626664393164 Dec 13 02:00:16.556000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.556000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.556000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.556000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.556000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.556000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.556000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.556000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.556000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.556000 audit: BPF prog-id=121 op=LOAD Dec 13 02:00:16.556000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a9dd8 items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:16.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373764343530306164383134636563646533396635626664393164 Dec 13 02:00:16.562000 audit: BPF prog-id=121 op=UNLOAD Dec 13 02:00:16.562000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:16.562000 audit: BPF prog-id=122 op=LOAD Dec 13 02:00:16.562000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003101e8 items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:16.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373764343530306164383134636563646533396635626664393164 Dec 13 02:00:16.600732 env[1219]: time="2024-12-13T02:00:16.600700361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5569976574-k54lk,Uid:75f34dac-f0fa-4ceb-adf3-56997f33fa8d,Namespace:calico-system,Attempt:0,} returns sandbox id \"d777d4500ad814cecde39f5bfd91deceef750cfee6d82f18b506e0f5e0be419e\"" Dec 13 02:00:16.601487 kubelet[2076]: E1213 02:00:16.601455 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:18.196611 kubelet[2076]: E1213 02:00:18.196549 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:18.485919 systemd[1]: Started sshd@7-10.0.0.133:22-10.0.0.1:40424.service. Dec 13 02:00:18.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.133:22-10.0.0.1:40424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:18.517000 audit[2620]: USER_ACCT pid=2620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:18.518565 sshd[2620]: Accepted publickey for core from 10.0.0.1 port 40424 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:18.518000 audit[2620]: CRED_ACQ pid=2620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:18.518000 audit[2620]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc123e9700 a2=3 a3=0 items=0 ppid=1 pid=2620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:18.518000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:18.519752 sshd[2620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:18.523703 systemd-logind[1206]: New session 8 of user core. Dec 13 02:00:18.524547 systemd[1]: Started session-8.scope. Dec 13 02:00:18.528000 audit[2620]: USER_START pid=2620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:18.529000 audit[2622]: CRED_ACQ pid=2622 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:18.631273 sshd[2620]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:18.631000 audit[2620]: USER_END pid=2620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:18.631000 audit[2620]: CRED_DISP pid=2620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:18.633615 systemd[1]: sshd@7-10.0.0.133:22-10.0.0.1:40424.service: Deactivated successfully. Dec 13 02:00:18.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.133:22-10.0.0.1:40424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:18.634277 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:00:18.634761 systemd-logind[1206]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:00:18.635479 systemd-logind[1206]: Removed session 8. Dec 13 02:00:20.196798 kubelet[2076]: E1213 02:00:20.196728 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:20.590207 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2090921487.mount: Deactivated successfully. Dec 13 02:00:21.668579 env[1219]: time="2024-12-13T02:00:21.668524584Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:21.670269 env[1219]: time="2024-12-13T02:00:21.670226009Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:21.671773 env[1219]: time="2024-12-13T02:00:21.671733680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:21.673276 env[1219]: time="2024-12-13T02:00:21.673243366Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:21.673671 env[1219]: time="2024-12-13T02:00:21.673633909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:00:21.675916 env[1219]: time="2024-12-13T02:00:21.674727202Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:00:21.676600 env[1219]: time="2024-12-13T02:00:21.676574571Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:00:21.689512 env[1219]: time="2024-12-13T02:00:21.689476230Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e\"" Dec 13 02:00:21.689822 env[1219]: time="2024-12-13T02:00:21.689758711Z" level=info msg="StartContainer for \"44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e\"" Dec 13 02:00:21.705863 systemd[1]: Started cri-containerd-44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e.scope. Dec 13 02:00:21.716970 kernel: kauditd_printk_skb: 58 callbacks suppressed Dec 13 02:00:21.717081 kernel: audit: type=1400 audit(1734055221.714:976): avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f31553c5298 items=0 ppid=2533 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:21.724350 kernel: audit: type=1300 audit(1734055221.714:976): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f31553c5298 items=0 ppid=2533 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:21.724395 kernel: audit: type=1327 audit(1734055221.714:976): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434623938633935653435366436366236636539393062386165323462 Dec 13 02:00:21.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434623938633935653435366436366236636539393062386165323462 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.731344 kernel: audit: type=1400 audit(1734055221.714:977): avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.731392 kernel: audit: type=1400 audit(1734055221.714:977): avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.734201 kernel: audit: type=1400 audit(1734055221.714:977): avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.740078 kernel: audit: type=1400 audit(1734055221.714:977): avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.740194 kernel: audit: type=1400 audit(1734055221.714:977): avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.746030 kernel: audit: type=1400 audit(1734055221.714:977): avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.746090 kernel: audit: type=1400 audit(1734055221.714:977): avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.714000 audit: BPF prog-id=123 op=LOAD Dec 13 02:00:21.714000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e3f58 items=0 ppid=2533 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:21.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434623938633935653435366436366236636539393062386165323462 Dec 13 02:00:21.718000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.718000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.718000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.718000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.718000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.718000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.718000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.718000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.718000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.718000 audit: BPF prog-id=124 op=LOAD Dec 13 02:00:21.718000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e3fa8 items=0 ppid=2533 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:21.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434623938633935653435366436366236636539393062386165323462 Dec 13 02:00:21.723000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:00:21.723000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:21.723000 audit: BPF prog-id=125 op=LOAD Dec 13 02:00:21.723000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ac038 items=0 ppid=2533 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:21.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434623938633935653435366436366236636539393062386165323462 Dec 13 02:00:21.751613 systemd[1]: cri-containerd-44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e.scope: Deactivated successfully. Dec 13 02:00:21.756000 audit: BPF prog-id=125 op=UNLOAD Dec 13 02:00:21.762027 env[1219]: time="2024-12-13T02:00:21.761982795Z" level=info msg="StartContainer for \"44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e\" returns successfully" Dec 13 02:00:21.776432 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e-rootfs.mount: Deactivated successfully. Dec 13 02:00:21.833054 env[1219]: time="2024-12-13T02:00:21.832988242Z" level=info msg="shim disconnected" id=44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e Dec 13 02:00:21.833054 env[1219]: time="2024-12-13T02:00:21.833039298Z" level=warning msg="cleaning up after shim disconnected" id=44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e namespace=k8s.io Dec 13 02:00:21.833054 env[1219]: time="2024-12-13T02:00:21.833049747Z" level=info msg="cleaning up dead shim" Dec 13 02:00:21.839839 env[1219]: time="2024-12-13T02:00:21.839801086Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:00:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2681 runtime=io.containerd.runc.v2\n" Dec 13 02:00:22.196388 kubelet[2076]: E1213 02:00:22.196318 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:22.265251 kubelet[2076]: E1213 02:00:22.265220 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:23.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.133:22-10.0.0.1:40440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:23.636553 systemd[1]: Started sshd@8-10.0.0.133:22-10.0.0.1:40440.service. Dec 13 02:00:23.703000 audit[2699]: USER_ACCT pid=2699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:23.704644 sshd[2699]: Accepted publickey for core from 10.0.0.1 port 40440 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:23.704000 audit[2699]: CRED_ACQ pid=2699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:23.704000 audit[2699]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff99c0cff0 a2=3 a3=0 items=0 ppid=1 pid=2699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:23.704000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:23.705951 sshd[2699]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:23.710129 systemd[1]: Started session-9.scope. Dec 13 02:00:23.711411 systemd-logind[1206]: New session 9 of user core. Dec 13 02:00:23.714000 audit[2699]: USER_START pid=2699 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:23.715000 audit[2701]: CRED_ACQ pid=2701 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:23.827194 sshd[2699]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:23.827000 audit[2699]: USER_END pid=2699 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:23.827000 audit[2699]: CRED_DISP pid=2699 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:23.829870 systemd[1]: sshd@8-10.0.0.133:22-10.0.0.1:40440.service: Deactivated successfully. Dec 13 02:00:23.830808 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:00:23.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.133:22-10.0.0.1:40440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:23.831741 systemd-logind[1206]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:00:23.832856 systemd-logind[1206]: Removed session 9. Dec 13 02:00:24.196449 kubelet[2076]: E1213 02:00:24.196392 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:24.733458 env[1219]: time="2024-12-13T02:00:24.733389157Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:24.735180 env[1219]: time="2024-12-13T02:00:24.735129154Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:24.736567 env[1219]: time="2024-12-13T02:00:24.736514676Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:24.737798 env[1219]: time="2024-12-13T02:00:24.737760595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:24.738139 env[1219]: time="2024-12-13T02:00:24.738112365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:00:24.739465 env[1219]: time="2024-12-13T02:00:24.739421503Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:00:24.750914 env[1219]: time="2024-12-13T02:00:24.750860029Z" level=info msg="CreateContainer within sandbox \"d777d4500ad814cecde39f5bfd91deceef750cfee6d82f18b506e0f5e0be419e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:00:24.763961 env[1219]: time="2024-12-13T02:00:24.763901536Z" level=info msg="CreateContainer within sandbox \"d777d4500ad814cecde39f5bfd91deceef750cfee6d82f18b506e0f5e0be419e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b5ed60d583ab709a84605d9d2a56b918ba069aa01526d8bb9e31cf714113bff8\"" Dec 13 02:00:24.765527 env[1219]: time="2024-12-13T02:00:24.765474049Z" level=info msg="StartContainer for \"b5ed60d583ab709a84605d9d2a56b918ba069aa01526d8bb9e31cf714113bff8\"" Dec 13 02:00:24.779274 systemd[1]: Started cri-containerd-b5ed60d583ab709a84605d9d2a56b918ba069aa01526d8bb9e31cf714113bff8.scope. Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.789000 audit: BPF prog-id=126 op=LOAD Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2586 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235656436306435383361623730396138343630356439643261353662 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2586 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235656436306435383361623730396138343630356439643261353662 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit: BPF prog-id=127 op=LOAD Dec 13 02:00:24.790000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000303dc0 items=0 ppid=2586 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235656436306435383361623730396138343630356439643261353662 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit: BPF prog-id=128 op=LOAD Dec 13 02:00:24.790000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000303e08 items=0 ppid=2586 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235656436306435383361623730396138343630356439643261353662 Dec 13 02:00:24.790000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:00:24.790000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:24.790000 audit: BPF prog-id=129 op=LOAD Dec 13 02:00:24.790000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00036c218 items=0 ppid=2586 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:24.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235656436306435383361623730396138343630356439643261353662 Dec 13 02:00:24.855797 env[1219]: time="2024-12-13T02:00:24.855741603Z" level=info msg="StartContainer for \"b5ed60d583ab709a84605d9d2a56b918ba069aa01526d8bb9e31cf714113bff8\" returns successfully" Dec 13 02:00:25.273357 kubelet[2076]: E1213 02:00:25.273318 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:25.287136 kubelet[2076]: I1213 02:00:25.287093 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5569976574-k54lk" podStartSLOduration=3.150559321 podStartE2EDuration="11.287076643s" podCreationTimestamp="2024-12-13 02:00:14 +0000 UTC" firstStartedPulling="2024-12-13 02:00:16.602343468 +0000 UTC m=+28.479393127" lastFinishedPulling="2024-12-13 02:00:24.73886078 +0000 UTC m=+36.615910449" observedRunningTime="2024-12-13 02:00:25.286855077 +0000 UTC m=+37.163904746" watchObservedRunningTime="2024-12-13 02:00:25.287076643 +0000 UTC m=+37.164126312" Dec 13 02:00:26.197120 kubelet[2076]: E1213 02:00:26.197073 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:26.273134 kubelet[2076]: I1213 02:00:26.273096 2076 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:00:26.273638 kubelet[2076]: E1213 02:00:26.273617 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:28.197232 kubelet[2076]: E1213 02:00:28.197183 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:28.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.133:22-10.0.0.1:33758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:28.831143 systemd[1]: Started sshd@9-10.0.0.133:22-10.0.0.1:33758.service. Dec 13 02:00:28.832227 kernel: kauditd_printk_skb: 102 callbacks suppressed Dec 13 02:00:28.832503 kernel: audit: type=1130 audit(1734055228.830:1010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.133:22-10.0.0.1:33758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:28.884000 audit[2756]: USER_ACCT pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:28.885886 sshd[2756]: Accepted publickey for core from 10.0.0.1 port 33758 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:28.887495 sshd[2756]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:28.886000 audit[2756]: CRED_ACQ pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:28.892981 systemd-logind[1206]: New session 10 of user core. Dec 13 02:00:28.894592 kernel: audit: type=1101 audit(1734055228.884:1011): pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:28.894709 kernel: audit: type=1103 audit(1734055228.886:1012): pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:28.894762 kernel: audit: type=1006 audit(1734055228.886:1013): pid=2756 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 02:00:28.893490 systemd[1]: Started session-10.scope. Dec 13 02:00:28.896805 kernel: audit: type=1300 audit(1734055228.886:1013): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde0475370 a2=3 a3=0 items=0 ppid=1 pid=2756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:28.886000 audit[2756]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde0475370 a2=3 a3=0 items=0 ppid=1 pid=2756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:28.903221 kernel: audit: type=1327 audit(1734055228.886:1013): proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:28.886000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:28.896000 audit[2756]: USER_START pid=2756 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:28.908283 kernel: audit: type=1105 audit(1734055228.896:1014): pid=2756 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:28.898000 audit[2758]: CRED_ACQ pid=2758 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:28.911876 kernel: audit: type=1103 audit(1734055228.898:1015): pid=2758 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:29.007308 sshd[2756]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:29.015858 kernel: audit: type=1106 audit(1734055229.007:1016): pid=2756 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:29.015948 kernel: audit: type=1104 audit(1734055229.007:1017): pid=2756 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:29.007000 audit[2756]: USER_END pid=2756 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:29.007000 audit[2756]: CRED_DISP pid=2756 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:29.009494 systemd[1]: sshd@9-10.0.0.133:22-10.0.0.1:33758.service: Deactivated successfully. Dec 13 02:00:29.010268 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:00:29.010759 systemd-logind[1206]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:00:29.011391 systemd-logind[1206]: Removed session 10. Dec 13 02:00:29.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.133:22-10.0.0.1:33758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:30.196765 kubelet[2076]: E1213 02:00:30.196699 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:30.469000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:30.469000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000b7820 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:00:30.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:00:30.469000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:30.469000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cf20f0 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:00:30.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:00:31.484215 env[1219]: time="2024-12-13T02:00:31.484165739Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:31.486109 env[1219]: time="2024-12-13T02:00:31.486081997Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:31.487469 env[1219]: time="2024-12-13T02:00:31.487445455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:31.488869 env[1219]: time="2024-12-13T02:00:31.488840845Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:31.489320 env[1219]: time="2024-12-13T02:00:31.489287883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:00:31.491105 env[1219]: time="2024-12-13T02:00:31.491064397Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:00:31.505044 env[1219]: time="2024-12-13T02:00:31.504987610Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9\"" Dec 13 02:00:31.505512 env[1219]: time="2024-12-13T02:00:31.505476398Z" level=info msg="StartContainer for \"7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9\"" Dec 13 02:00:31.523893 systemd[1]: Started cri-containerd-7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9.scope. Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5761422958 items=0 ppid=2533 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:31.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663863326561633437373835626633366465613038336661396630 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit: BPF prog-id=130 op=LOAD Dec 13 02:00:31.541000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000261168 items=0 ppid=2533 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:31.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663863326561633437373835626633366465613038336661396630 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit: BPF prog-id=131 op=LOAD Dec 13 02:00:31.541000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002611b8 items=0 ppid=2533 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:31.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663863326561633437373835626633366465613038336661396630 Dec 13 02:00:31.541000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:00:31.541000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:31.541000 audit: BPF prog-id=132 op=LOAD Dec 13 02:00:31.541000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000261248 items=0 ppid=2533 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:31.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663863326561633437373835626633366465613038336661396630 Dec 13 02:00:31.587384 env[1219]: time="2024-12-13T02:00:31.587323866Z" level=info msg="StartContainer for \"7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9\" returns successfully" Dec 13 02:00:32.064433 kubelet[2076]: I1213 02:00:32.064397 2076 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:00:32.064976 kubelet[2076]: E1213 02:00:32.064961 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:32.196575 kubelet[2076]: E1213 02:00:32.196526 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:32.284276 kubelet[2076]: E1213 02:00:32.284233 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:32.284428 kubelet[2076]: E1213 02:00:32.284311 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:32.899000 audit[2807]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:32.899000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcb72cc900 a2=0 a3=7ffcb72cc8ec items=0 ppid=2224 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:32.906000 audit[2807]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:00:32.906000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcb72cc900 a2=0 a3=7ffcb72cc8ec items=0 ppid=2224 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:32.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:00:33.076471 env[1219]: time="2024-12-13T02:00:33.076394977Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" Dec 13 02:00:33.078356 systemd[1]: cri-containerd-7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9.scope: Deactivated successfully. Dec 13 02:00:33.083000 audit: BPF prog-id=132 op=UNLOAD Dec 13 02:00:33.097386 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9-rootfs.mount: Deactivated successfully. Dec 13 02:00:33.107278 env[1219]: time="2024-12-13T02:00:33.107215119Z" level=info msg="shim disconnected" id=7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9 Dec 13 02:00:33.107278 env[1219]: time="2024-12-13T02:00:33.107263890Z" level=warning msg="cleaning up after shim disconnected" id=7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9 namespace=k8s.io Dec 13 02:00:33.107278 env[1219]: time="2024-12-13T02:00:33.107273518Z" level=info msg="cleaning up dead shim" Dec 13 02:00:33.113377 env[1219]: time="2024-12-13T02:00:33.113321850Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:00:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2821 runtime=io.containerd.runc.v2\n" Dec 13 02:00:33.114581 kubelet[2076]: I1213 02:00:33.114548 2076 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:00:33.130905 kubelet[2076]: I1213 02:00:33.130854 2076 topology_manager.go:215] "Topology Admit Handler" podUID="0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0" podNamespace="kube-system" podName="coredns-7db6d8ff4d-v6gs7" Dec 13 02:00:33.134263 kubelet[2076]: I1213 02:00:33.134178 2076 topology_manager.go:215] "Topology Admit Handler" podUID="1184bdee-ddbd-4572-9358-2e64b0d4fb76" podNamespace="calico-system" podName="calico-kube-controllers-5bd74ff756-ts7cv" Dec 13 02:00:33.135113 kubelet[2076]: I1213 02:00:33.135098 2076 topology_manager.go:215] "Topology Admit Handler" podUID="84cc8599-b8a8-43d2-8b5c-5a022da5fb55" podNamespace="calico-apiserver" podName="calico-apiserver-6f6b995bdd-4fxb8" Dec 13 02:00:33.137444 kubelet[2076]: I1213 02:00:33.136135 2076 topology_manager.go:215] "Topology Admit Handler" podUID="29d76287-050b-45b1-afc1-918e6f3fd86b" podNamespace="calico-apiserver" podName="calico-apiserver-6f6b995bdd-46kpn" Dec 13 02:00:33.137444 kubelet[2076]: I1213 02:00:33.136283 2076 topology_manager.go:215] "Topology Admit Handler" podUID="88080b51-d429-4316-8cdf-3f4303a92112" podNamespace="kube-system" podName="coredns-7db6d8ff4d-4qj2w" Dec 13 02:00:33.137353 systemd[1]: Created slice kubepods-burstable-pod0a6f3aa8_8f0c_4a2b_8f0f_8da01da1bfe0.slice. Dec 13 02:00:33.143352 systemd[1]: Created slice kubepods-besteffort-pod84cc8599_b8a8_43d2_8b5c_5a022da5fb55.slice. Dec 13 02:00:33.147529 systemd[1]: Created slice kubepods-besteffort-pod1184bdee_ddbd_4572_9358_2e64b0d4fb76.slice. Dec 13 02:00:33.151629 systemd[1]: Created slice kubepods-burstable-pod88080b51_d429_4316_8cdf_3f4303a92112.slice. Dec 13 02:00:33.155035 systemd[1]: Created slice kubepods-besteffort-pod29d76287_050b_45b1_afc1_918e6f3fd86b.slice. Dec 13 02:00:33.186812 kubelet[2076]: I1213 02:00:33.186769 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7ntqf\" (UniqueName: \"kubernetes.io/projected/0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0-kube-api-access-7ntqf\") pod \"coredns-7db6d8ff4d-v6gs7\" (UID: \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\") " pod="kube-system/coredns-7db6d8ff4d-v6gs7" Dec 13 02:00:33.186978 kubelet[2076]: I1213 02:00:33.186818 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5fpf5\" (UniqueName: \"kubernetes.io/projected/1184bdee-ddbd-4572-9358-2e64b0d4fb76-kube-api-access-5fpf5\") pod \"calico-kube-controllers-5bd74ff756-ts7cv\" (UID: \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\") " pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" Dec 13 02:00:33.186978 kubelet[2076]: I1213 02:00:33.186838 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n8tzj\" (UniqueName: \"kubernetes.io/projected/88080b51-d429-4316-8cdf-3f4303a92112-kube-api-access-n8tzj\") pod \"coredns-7db6d8ff4d-4qj2w\" (UID: \"88080b51-d429-4316-8cdf-3f4303a92112\") " pod="kube-system/coredns-7db6d8ff4d-4qj2w" Dec 13 02:00:33.186978 kubelet[2076]: I1213 02:00:33.186856 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lqq8x\" (UniqueName: \"kubernetes.io/projected/29d76287-050b-45b1-afc1-918e6f3fd86b-kube-api-access-lqq8x\") pod \"calico-apiserver-6f6b995bdd-46kpn\" (UID: \"29d76287-050b-45b1-afc1-918e6f3fd86b\") " pod="calico-apiserver/calico-apiserver-6f6b995bdd-46kpn" Dec 13 02:00:33.186978 kubelet[2076]: I1213 02:00:33.186874 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/88080b51-d429-4316-8cdf-3f4303a92112-config-volume\") pod \"coredns-7db6d8ff4d-4qj2w\" (UID: \"88080b51-d429-4316-8cdf-3f4303a92112\") " pod="kube-system/coredns-7db6d8ff4d-4qj2w" Dec 13 02:00:33.186978 kubelet[2076]: I1213 02:00:33.186946 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0-config-volume\") pod \"coredns-7db6d8ff4d-v6gs7\" (UID: \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\") " pod="kube-system/coredns-7db6d8ff4d-v6gs7" Dec 13 02:00:33.187150 kubelet[2076]: I1213 02:00:33.186966 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wp964\" (UniqueName: \"kubernetes.io/projected/84cc8599-b8a8-43d2-8b5c-5a022da5fb55-kube-api-access-wp964\") pod \"calico-apiserver-6f6b995bdd-4fxb8\" (UID: \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\") " pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" Dec 13 02:00:33.187150 kubelet[2076]: I1213 02:00:33.186988 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1184bdee-ddbd-4572-9358-2e64b0d4fb76-tigera-ca-bundle\") pod \"calico-kube-controllers-5bd74ff756-ts7cv\" (UID: \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\") " pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" Dec 13 02:00:33.187150 kubelet[2076]: I1213 02:00:33.187004 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/29d76287-050b-45b1-afc1-918e6f3fd86b-calico-apiserver-certs\") pod \"calico-apiserver-6f6b995bdd-46kpn\" (UID: \"29d76287-050b-45b1-afc1-918e6f3fd86b\") " pod="calico-apiserver/calico-apiserver-6f6b995bdd-46kpn" Dec 13 02:00:33.187150 kubelet[2076]: I1213 02:00:33.187020 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/84cc8599-b8a8-43d2-8b5c-5a022da5fb55-calico-apiserver-certs\") pod \"calico-apiserver-6f6b995bdd-4fxb8\" (UID: \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\") " pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" Dec 13 02:00:33.286922 kubelet[2076]: E1213 02:00:33.286897 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:33.287588 env[1219]: time="2024-12-13T02:00:33.287540866Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:00:33.441004 kubelet[2076]: E1213 02:00:33.440877 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:33.441547 env[1219]: time="2024-12-13T02:00:33.441510049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v6gs7,Uid:0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0,Namespace:kube-system,Attempt:0,}" Dec 13 02:00:33.445749 env[1219]: time="2024-12-13T02:00:33.445705452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6b995bdd-4fxb8,Uid:84cc8599-b8a8-43d2-8b5c-5a022da5fb55,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:00:33.451103 env[1219]: time="2024-12-13T02:00:33.451062977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bd74ff756-ts7cv,Uid:1184bdee-ddbd-4572-9358-2e64b0d4fb76,Namespace:calico-system,Attempt:0,}" Dec 13 02:00:33.455227 kubelet[2076]: E1213 02:00:33.455196 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:33.456073 env[1219]: time="2024-12-13T02:00:33.456032975Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4qj2w,Uid:88080b51-d429-4316-8cdf-3f4303a92112,Namespace:kube-system,Attempt:0,}" Dec 13 02:00:33.456604 env[1219]: time="2024-12-13T02:00:33.456571124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6b995bdd-46kpn,Uid:29d76287-050b-45b1-afc1-918e6f3fd86b,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:00:33.557360 env[1219]: time="2024-12-13T02:00:33.557301941Z" level=error msg="Failed to destroy network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.557831 env[1219]: time="2024-12-13T02:00:33.557791610Z" level=error msg="encountered an error cleaning up failed sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.558030 env[1219]: time="2024-12-13T02:00:33.557866451Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6b995bdd-46kpn,Uid:29d76287-050b-45b1-afc1-918e6f3fd86b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.558159 kubelet[2076]: E1213 02:00:33.558114 2076 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.558242 kubelet[2076]: E1213 02:00:33.558182 2076 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6f6b995bdd-46kpn" Dec 13 02:00:33.558242 kubelet[2076]: E1213 02:00:33.558202 2076 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6f6b995bdd-46kpn" Dec 13 02:00:33.558297 kubelet[2076]: E1213 02:00:33.558245 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6f6b995bdd-46kpn_calico-apiserver(29d76287-050b-45b1-afc1-918e6f3fd86b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6f6b995bdd-46kpn_calico-apiserver(29d76287-050b-45b1-afc1-918e6f3fd86b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6b995bdd-46kpn" podUID="29d76287-050b-45b1-afc1-918e6f3fd86b" Dec 13 02:00:33.569221 env[1219]: time="2024-12-13T02:00:33.569178872Z" level=error msg="Failed to destroy network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.569509 env[1219]: time="2024-12-13T02:00:33.569474286Z" level=error msg="encountered an error cleaning up failed sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.569549 env[1219]: time="2024-12-13T02:00:33.569520432Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bd74ff756-ts7cv,Uid:1184bdee-ddbd-4572-9358-2e64b0d4fb76,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.569710 kubelet[2076]: E1213 02:00:33.569663 2076 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.569762 kubelet[2076]: E1213 02:00:33.569708 2076 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" Dec 13 02:00:33.569762 kubelet[2076]: E1213 02:00:33.569727 2076 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" Dec 13 02:00:33.569818 kubelet[2076]: E1213 02:00:33.569763 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5bd74ff756-ts7cv_calico-system(1184bdee-ddbd-4572-9358-2e64b0d4fb76)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5bd74ff756-ts7cv_calico-system(1184bdee-ddbd-4572-9358-2e64b0d4fb76)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" podUID="1184bdee-ddbd-4572-9358-2e64b0d4fb76" Dec 13 02:00:33.578480 env[1219]: time="2024-12-13T02:00:33.578410507Z" level=error msg="Failed to destroy network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.578833 env[1219]: time="2024-12-13T02:00:33.578797423Z" level=error msg="encountered an error cleaning up failed sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.578893 env[1219]: time="2024-12-13T02:00:33.578852146Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v6gs7,Uid:0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.579123 kubelet[2076]: E1213 02:00:33.579077 2076 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.579179 kubelet[2076]: E1213 02:00:33.579139 2076 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-v6gs7" Dec 13 02:00:33.579179 kubelet[2076]: E1213 02:00:33.579164 2076 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-v6gs7" Dec 13 02:00:33.579230 kubelet[2076]: E1213 02:00:33.579202 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-v6gs7_kube-system(0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-v6gs7_kube-system(0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v6gs7" podUID="0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0" Dec 13 02:00:33.585419 env[1219]: time="2024-12-13T02:00:33.585365580Z" level=error msg="Failed to destroy network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.585630 env[1219]: time="2024-12-13T02:00:33.585602114Z" level=error msg="encountered an error cleaning up failed sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.585660 env[1219]: time="2024-12-13T02:00:33.585641688Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6b995bdd-4fxb8,Uid:84cc8599-b8a8-43d2-8b5c-5a022da5fb55,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.585777 kubelet[2076]: E1213 02:00:33.585751 2076 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.585840 kubelet[2076]: E1213 02:00:33.585782 2076 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" Dec 13 02:00:33.585840 kubelet[2076]: E1213 02:00:33.585797 2076 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" Dec 13 02:00:33.585840 kubelet[2076]: E1213 02:00:33.585824 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6f6b995bdd-4fxb8_calico-apiserver(84cc8599-b8a8-43d2-8b5c-5a022da5fb55)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6f6b995bdd-4fxb8_calico-apiserver(84cc8599-b8a8-43d2-8b5c-5a022da5fb55)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" podUID="84cc8599-b8a8-43d2-8b5c-5a022da5fb55" Dec 13 02:00:33.590136 env[1219]: time="2024-12-13T02:00:33.590088593Z" level=error msg="Failed to destroy network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.590418 env[1219]: time="2024-12-13T02:00:33.590383838Z" level=error msg="encountered an error cleaning up failed sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.590452 env[1219]: time="2024-12-13T02:00:33.590431998Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4qj2w,Uid:88080b51-d429-4316-8cdf-3f4303a92112,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.590608 kubelet[2076]: E1213 02:00:33.590585 2076 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:33.590659 kubelet[2076]: E1213 02:00:33.590613 2076 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-4qj2w" Dec 13 02:00:33.590659 kubelet[2076]: E1213 02:00:33.590628 2076 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-4qj2w" Dec 13 02:00:33.590709 kubelet[2076]: E1213 02:00:33.590666 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-4qj2w_kube-system(88080b51-d429-4316-8cdf-3f4303a92112)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-4qj2w_kube-system(88080b51-d429-4316-8cdf-3f4303a92112)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4qj2w" podUID="88080b51-d429-4316-8cdf-3f4303a92112" Dec 13 02:00:34.011021 systemd[1]: Started sshd@10-10.0.0.133:22-10.0.0.1:33768.service. Dec 13 02:00:34.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.133:22-10.0.0.1:33768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:34.012130 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 02:00:34.012383 kernel: audit: type=1130 audit(1734055234.010:1030): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.133:22-10.0.0.1:33768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:34.043000 audit[3041]: USER_ACCT pid=3041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.045002 sshd[3041]: Accepted publickey for core from 10.0.0.1 port 33768 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:34.057622 sshd[3041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:34.056000 audit[3041]: CRED_ACQ pid=3041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.061297 systemd-logind[1206]: New session 11 of user core. Dec 13 02:00:34.062335 systemd[1]: Started session-11.scope. Dec 13 02:00:34.064087 kernel: audit: type=1101 audit(1734055234.043:1031): pid=3041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.064149 kernel: audit: type=1103 audit(1734055234.056:1032): pid=3041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.064168 kernel: audit: type=1006 audit(1734055234.056:1033): pid=3041 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 02:00:34.056000 audit[3041]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1e67f3e0 a2=3 a3=0 items=0 ppid=1 pid=3041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:34.070185 kernel: audit: type=1300 audit(1734055234.056:1033): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1e67f3e0 a2=3 a3=0 items=0 ppid=1 pid=3041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:34.070283 kernel: audit: type=1327 audit(1734055234.056:1033): proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:34.056000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:34.071475 kernel: audit: type=1105 audit(1734055234.065:1034): pid=3041 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.065000 audit[3041]: USER_START pid=3041 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.075644 kernel: audit: type=1103 audit(1734055234.067:1035): pid=3043 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.067000 audit[3043]: CRED_ACQ pid=3043 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.165008 sshd[3041]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:34.165000 audit[3041]: USER_END pid=3041 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.168862 systemd[1]: Started sshd@11-10.0.0.133:22-10.0.0.1:33780.service. Dec 13 02:00:34.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.133:22-10.0.0.1:33780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:34.171130 systemd[1]: sshd@10-10.0.0.133:22-10.0.0.1:33768.service: Deactivated successfully. Dec 13 02:00:34.171619 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:00:34.172176 systemd-logind[1206]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:00:34.172844 systemd-logind[1206]: Removed session 11. Dec 13 02:00:34.173743 kernel: audit: type=1106 audit(1734055234.165:1036): pid=3041 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.173802 kernel: audit: type=1130 audit(1734055234.165:1037): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.133:22-10.0.0.1:33780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:34.165000 audit[3041]: CRED_DISP pid=3041 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.133:22-10.0.0.1:33768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:34.200491 systemd[1]: Created slice kubepods-besteffort-pod2bd5041f_f9cd_42cf_a423_3f4b7c4eecee.slice. Dec 13 02:00:34.199000 audit[3054]: USER_ACCT pid=3054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.200838 sshd[3054]: Accepted publickey for core from 10.0.0.1 port 33780 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:34.200000 audit[3054]: CRED_ACQ pid=3054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.200000 audit[3054]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a422930 a2=3 a3=0 items=0 ppid=1 pid=3054 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:34.200000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:34.202019 sshd[3054]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:34.202920 env[1219]: time="2024-12-13T02:00:34.202884347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v75ck,Uid:2bd5041f-f9cd-42cf-a423-3f4b7c4eecee,Namespace:calico-system,Attempt:0,}" Dec 13 02:00:34.205208 systemd-logind[1206]: New session 12 of user core. Dec 13 02:00:34.205884 systemd[1]: Started session-12.scope. Dec 13 02:00:34.209000 audit[3054]: USER_START pid=3054 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.210000 audit[3057]: CRED_ACQ pid=3057 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.260102 env[1219]: time="2024-12-13T02:00:34.260035031Z" level=error msg="Failed to destroy network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.262109 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4-shm.mount: Deactivated successfully. Dec 13 02:00:34.262253 env[1219]: time="2024-12-13T02:00:34.262224901Z" level=error msg="encountered an error cleaning up failed sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.262296 env[1219]: time="2024-12-13T02:00:34.262275336Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v75ck,Uid:2bd5041f-f9cd-42cf-a423-3f4b7c4eecee,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.263167 kubelet[2076]: E1213 02:00:34.263094 2076 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.263167 kubelet[2076]: E1213 02:00:34.263164 2076 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-v75ck" Dec 13 02:00:34.263413 kubelet[2076]: E1213 02:00:34.263182 2076 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-v75ck" Dec 13 02:00:34.263413 kubelet[2076]: E1213 02:00:34.263219 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-v75ck_calico-system(2bd5041f-f9cd-42cf-a423-3f4b7c4eecee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-v75ck_calico-system(2bd5041f-f9cd-42cf-a423-3f4b7c4eecee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:34.289433 kubelet[2076]: I1213 02:00:34.289397 2076 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:00:34.290186 env[1219]: time="2024-12-13T02:00:34.290150679Z" level=info msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\"" Dec 13 02:00:34.290847 kubelet[2076]: I1213 02:00:34.290818 2076 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:00:34.291203 env[1219]: time="2024-12-13T02:00:34.291151207Z" level=info msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\"" Dec 13 02:00:34.293799 kubelet[2076]: I1213 02:00:34.293773 2076 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:00:34.294228 env[1219]: time="2024-12-13T02:00:34.294190341Z" level=info msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\"" Dec 13 02:00:34.296669 kubelet[2076]: I1213 02:00:34.296395 2076 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:00:34.297082 env[1219]: time="2024-12-13T02:00:34.297056730Z" level=info msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\"" Dec 13 02:00:34.300593 kubelet[2076]: I1213 02:00:34.300563 2076 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:00:34.302166 env[1219]: time="2024-12-13T02:00:34.302135150Z" level=info msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\"" Dec 13 02:00:34.303493 kubelet[2076]: I1213 02:00:34.303136 2076 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:00:34.303672 env[1219]: time="2024-12-13T02:00:34.303651787Z" level=info msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\"" Dec 13 02:00:34.329125 env[1219]: time="2024-12-13T02:00:34.329071842Z" level=error msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" failed" error="failed to destroy network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.330003 kubelet[2076]: E1213 02:00:34.329763 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:00:34.330003 kubelet[2076]: E1213 02:00:34.329815 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea"} Dec 13 02:00:34.330003 kubelet[2076]: E1213 02:00:34.329866 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88080b51-d429-4316-8cdf-3f4303a92112\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:34.330003 kubelet[2076]: E1213 02:00:34.329887 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88080b51-d429-4316-8cdf-3f4303a92112\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4qj2w" podUID="88080b51-d429-4316-8cdf-3f4303a92112" Dec 13 02:00:34.344971 env[1219]: time="2024-12-13T02:00:34.344891991Z" level=error msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\" failed" error="failed to destroy network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.345405 kubelet[2076]: E1213 02:00:34.345352 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:00:34.345469 kubelet[2076]: E1213 02:00:34.345408 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9"} Dec 13 02:00:34.345469 kubelet[2076]: E1213 02:00:34.345442 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"29d76287-050b-45b1-afc1-918e6f3fd86b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:34.345469 kubelet[2076]: E1213 02:00:34.345462 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"29d76287-050b-45b1-afc1-918e6f3fd86b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6b995bdd-46kpn" podUID="29d76287-050b-45b1-afc1-918e6f3fd86b" Dec 13 02:00:34.351243 env[1219]: time="2024-12-13T02:00:34.351182016Z" level=error msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" failed" error="failed to destroy network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.351702 kubelet[2076]: E1213 02:00:34.351556 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:00:34.351702 kubelet[2076]: E1213 02:00:34.351590 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38"} Dec 13 02:00:34.351702 kubelet[2076]: E1213 02:00:34.351631 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:34.351702 kubelet[2076]: E1213 02:00:34.351656 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" podUID="84cc8599-b8a8-43d2-8b5c-5a022da5fb55" Dec 13 02:00:34.360424 env[1219]: time="2024-12-13T02:00:34.360369668Z" level=error msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" failed" error="failed to destroy network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.360639 kubelet[2076]: E1213 02:00:34.360579 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:00:34.360639 kubelet[2076]: E1213 02:00:34.360625 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4"} Dec 13 02:00:34.360736 kubelet[2076]: E1213 02:00:34.360654 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:34.360736 kubelet[2076]: E1213 02:00:34.360676 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:34.368696 env[1219]: time="2024-12-13T02:00:34.368657862Z" level=error msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" failed" error="failed to destroy network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.369078 kubelet[2076]: E1213 02:00:34.368946 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:00:34.369078 kubelet[2076]: E1213 02:00:34.368994 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03"} Dec 13 02:00:34.369078 kubelet[2076]: E1213 02:00:34.369023 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:34.369078 kubelet[2076]: E1213 02:00:34.369046 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v6gs7" podUID="0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0" Dec 13 02:00:34.372327 env[1219]: time="2024-12-13T02:00:34.372270703Z" level=error msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" failed" error="failed to destroy network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:34.372493 kubelet[2076]: E1213 02:00:34.372457 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:00:34.372541 kubelet[2076]: E1213 02:00:34.372509 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00"} Dec 13 02:00:34.372572 kubelet[2076]: E1213 02:00:34.372541 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:34.372644 kubelet[2076]: E1213 02:00:34.372564 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" podUID="1184bdee-ddbd-4572-9358-2e64b0d4fb76" Dec 13 02:00:34.572598 sshd[3054]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:34.572000 audit[3054]: USER_END pid=3054 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.573000 audit[3054]: CRED_DISP pid=3054 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.133:22-10.0.0.1:33782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:34.574866 systemd[1]: Started sshd@12-10.0.0.133:22-10.0.0.1:33782.service. Dec 13 02:00:34.575327 systemd[1]: sshd@11-10.0.0.133:22-10.0.0.1:33780.service: Deactivated successfully. Dec 13 02:00:34.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.133:22-10.0.0.1:33780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:34.575984 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:00:34.576590 systemd-logind[1206]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:00:34.577697 systemd-logind[1206]: Removed session 12. Dec 13 02:00:34.610000 audit[3243]: USER_ACCT pid=3243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.611442 sshd[3243]: Accepted publickey for core from 10.0.0.1 port 33782 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:34.611000 audit[3243]: CRED_ACQ pid=3243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.611000 audit[3243]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2eb00010 a2=3 a3=0 items=0 ppid=1 pid=3243 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:34.611000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:34.612661 sshd[3243]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:34.616084 systemd-logind[1206]: New session 13 of user core. Dec 13 02:00:34.617041 systemd[1]: Started session-13.scope. Dec 13 02:00:34.620000 audit[3243]: USER_START pid=3243 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.621000 audit[3246]: CRED_ACQ pid=3246 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.720031 sshd[3243]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:34.720000 audit[3243]: USER_END pid=3243 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.720000 audit[3243]: CRED_DISP pid=3243 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:34.722199 systemd[1]: sshd@12-10.0.0.133:22-10.0.0.1:33782.service: Deactivated successfully. Dec 13 02:00:34.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.133:22-10.0.0.1:33782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:34.722926 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:00:34.723502 systemd-logind[1206]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:00:34.724209 systemd-logind[1206]: Removed session 13. Dec 13 02:00:39.723709 systemd[1]: Started sshd@13-10.0.0.133:22-10.0.0.1:59008.service. Dec 13 02:00:39.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.133:22-10.0.0.1:59008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:39.728224 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 02:00:39.728284 kernel: audit: type=1130 audit(1734055239.722:1057): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.133:22-10.0.0.1:59008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:39.762000 audit[3258]: USER_ACCT pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.763716 sshd[3258]: Accepted publickey for core from 10.0.0.1 port 59008 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:39.767000 audit[3258]: CRED_ACQ pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.768744 sshd[3258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:39.772558 kernel: audit: type=1101 audit(1734055239.762:1058): pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.772612 kernel: audit: type=1103 audit(1734055239.767:1059): pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.767000 audit[3258]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc0cdfb30 a2=3 a3=0 items=0 ppid=1 pid=3258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:39.780379 kernel: audit: type=1006 audit(1734055239.767:1060): pid=3258 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 02:00:39.780432 kernel: audit: type=1300 audit(1734055239.767:1060): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc0cdfb30 a2=3 a3=0 items=0 ppid=1 pid=3258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:39.780460 kernel: audit: type=1327 audit(1734055239.767:1060): proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:39.767000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:39.783353 systemd-logind[1206]: New session 14 of user core. Dec 13 02:00:39.784317 systemd[1]: Started session-14.scope. Dec 13 02:00:39.787000 audit[3258]: USER_START pid=3258 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.793958 kernel: audit: type=1105 audit(1734055239.787:1061): pid=3258 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.789000 audit[3260]: CRED_ACQ pid=3260 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.798962 kernel: audit: type=1103 audit(1734055239.789:1062): pid=3260 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.918920 sshd[3258]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:39.929080 kernel: audit: type=1106 audit(1734055239.918:1063): pid=3258 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.929201 kernel: audit: type=1104 audit(1734055239.919:1064): pid=3258 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.918000 audit[3258]: USER_END pid=3258 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.919000 audit[3258]: CRED_DISP pid=3258 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:39.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.133:22-10.0.0.1:59008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:39.921137 systemd[1]: sshd@13-10.0.0.133:22-10.0.0.1:59008.service: Deactivated successfully. Dec 13 02:00:39.921857 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:00:39.922530 systemd-logind[1206]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:00:39.923325 systemd-logind[1206]: Removed session 14. Dec 13 02:00:41.925744 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1122359861.mount: Deactivated successfully. Dec 13 02:00:44.923505 systemd[1]: Started sshd@14-10.0.0.133:22-10.0.0.1:59020.service. Dec 13 02:00:44.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.133:22-10.0.0.1:59020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:44.924696 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:00:44.924762 kernel: audit: type=1130 audit(1734055244.922:1066): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.133:22-10.0.0.1:59020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:45.663000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:45.663000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00e574960 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:00:45.675665 kernel: audit: type=1400 audit(1734055245.663:1067): avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:45.675735 kernel: audit: type=1300 audit(1734055245.663:1067): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00e574960 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:00:45.675770 kernel: audit: type=1327 audit(1734055245.663:1067): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:00:45.663000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:00:45.663000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:45.683814 kernel: audit: type=1400 audit(1734055245.663:1068): avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:45.683867 kernel: audit: type=1300 audit(1734055245.663:1068): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00eabfbf0 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:00:45.663000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00eabfbf0 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:00:45.688688 kernel: audit: type=1327 audit(1734055245.663:1068): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:00:45.663000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:00:45.664000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:45.696642 kernel: audit: type=1400 audit(1734055245.664:1069): avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:45.696754 kernel: audit: type=1300 audit(1734055245.664:1069): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00eabfc50 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:00:45.664000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00eabfc50 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:00:45.664000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:00:45.704731 sshd[3272]: Accepted publickey for core from 10.0.0.1 port 59020 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:45.705570 kernel: audit: type=1327 audit(1734055245.664:1069): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:00:45.665000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:45.665000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00bd6dd20 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:00:45.665000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:00:45.666000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:45.666000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00f4e4c30 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:00:45.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:00:45.667000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:45.667000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00eedac00 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:00:45.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:00:45.703000 audit[3272]: USER_ACCT pid=3272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:45.704000 audit[3272]: CRED_ACQ pid=3272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:45.704000 audit[3272]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8fa1e6c0 a2=3 a3=0 items=0 ppid=1 pid=3272 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.704000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:45.754479 sshd[3272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:45.759487 systemd-logind[1206]: New session 15 of user core. Dec 13 02:00:45.759999 systemd[1]: Started session-15.scope. Dec 13 02:00:45.763000 audit[3272]: USER_START pid=3272 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:45.764000 audit[3274]: CRED_ACQ pid=3274 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:45.879855 env[1219]: time="2024-12-13T02:00:45.879794752Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:45.881955 sshd[3272]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:45.883411 env[1219]: time="2024-12-13T02:00:45.883325502Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:45.882000 audit[3272]: USER_END pid=3272 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:45.882000 audit[3272]: CRED_DISP pid=3272 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:45.885177 systemd[1]: sshd@14-10.0.0.133:22-10.0.0.1:59020.service: Deactivated successfully. Dec 13 02:00:45.885820 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:00:45.886015 env[1219]: time="2024-12-13T02:00:45.885984186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:45.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.133:22-10.0.0.1:59020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:45.886549 systemd-logind[1206]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:00:45.887373 env[1219]: time="2024-12-13T02:00:45.887318622Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:00:45.887500 systemd-logind[1206]: Removed session 15. Dec 13 02:00:45.887637 env[1219]: time="2024-12-13T02:00:45.887554896Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:00:45.898999 env[1219]: time="2024-12-13T02:00:45.898442184Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:00:45.914568 env[1219]: time="2024-12-13T02:00:45.914515114Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33\"" Dec 13 02:00:45.915208 env[1219]: time="2024-12-13T02:00:45.915132491Z" level=info msg="StartContainer for \"e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33\"" Dec 13 02:00:45.933064 systemd[1]: Started cri-containerd-e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33.scope. Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f38e349b2f8 items=0 ppid=2533 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536333534393365346462636264643634366231343936326563643139 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.947000 audit: BPF prog-id=133 op=LOAD Dec 13 02:00:45.947000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000025398 items=0 ppid=2533 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536333534393365346462636264643634366231343936326563643139 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit: BPF prog-id=134 op=LOAD Dec 13 02:00:45.948000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0000253e8 items=0 ppid=2533 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536333534393365346462636264643634366231343936326563643139 Dec 13 02:00:45.948000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:00:45.948000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:45.948000 audit: BPF prog-id=135 op=LOAD Dec 13 02:00:45.948000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000025478 items=0 ppid=2533 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:45.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536333534393365346462636264643634366231343936326563643139 Dec 13 02:00:45.966173 env[1219]: time="2024-12-13T02:00:45.966111180Z" level=info msg="StartContainer for \"e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33\" returns successfully" Dec 13 02:00:46.027449 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:00:46.027544 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:00:46.048816 systemd[1]: cri-containerd-e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33.scope: Deactivated successfully. Dec 13 02:00:46.053000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:00:46.197903 env[1219]: time="2024-12-13T02:00:46.197278107Z" level=info msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\"" Dec 13 02:00:46.325773 kubelet[2076]: E1213 02:00:46.325737 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:46.390153 env[1219]: time="2024-12-13T02:00:46.390091329Z" level=error msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" failed" error="failed to destroy network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:46.390372 kubelet[2076]: E1213 02:00:46.390334 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:00:46.390453 kubelet[2076]: E1213 02:00:46.390380 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03"} Dec 13 02:00:46.390453 kubelet[2076]: E1213 02:00:46.390407 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:46.390453 kubelet[2076]: E1213 02:00:46.390439 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v6gs7" podUID="0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0" Dec 13 02:00:46.424209 kubelet[2076]: I1213 02:00:46.424153 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-pf9vh" podStartSLOduration=1.804594991 podStartE2EDuration="32.42413677s" podCreationTimestamp="2024-12-13 02:00:14 +0000 UTC" firstStartedPulling="2024-12-13 02:00:15.269082293 +0000 UTC m=+27.146131973" lastFinishedPulling="2024-12-13 02:00:45.888624083 +0000 UTC m=+57.765673752" observedRunningTime="2024-12-13 02:00:46.42380911 +0000 UTC m=+58.300858779" watchObservedRunningTime="2024-12-13 02:00:46.42413677 +0000 UTC m=+58.301186429" Dec 13 02:00:46.482696 env[1219]: time="2024-12-13T02:00:46.482573588Z" level=info msg="shim disconnected" id=e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33 Dec 13 02:00:46.482696 env[1219]: time="2024-12-13T02:00:46.482629976Z" level=warning msg="cleaning up after shim disconnected" id=e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33 namespace=k8s.io Dec 13 02:00:46.482696 env[1219]: time="2024-12-13T02:00:46.482638613Z" level=info msg="cleaning up dead shim" Dec 13 02:00:46.482896 env[1219]: time="2024-12-13T02:00:46.482575662Z" level=error msg="ExecSync for \"e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"c305d5e78ed4db36528d398046bb977fe49ab56517e2cea7f85c1399c2276cc5\": task e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33 not found: not found" Dec 13 02:00:46.483122 kubelet[2076]: E1213 02:00:46.483084 2076 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"c305d5e78ed4db36528d398046bb977fe49ab56517e2cea7f85c1399c2276cc5\": task e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33 not found: not found" containerID="e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 02:00:46.484086 env[1219]: time="2024-12-13T02:00:46.484058552Z" level=error msg="ExecSync for \"e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33 not found: not found" Dec 13 02:00:46.484218 kubelet[2076]: E1213 02:00:46.484192 2076 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33 not found: not found" containerID="e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 02:00:46.485230 env[1219]: time="2024-12-13T02:00:46.485186008Z" level=error msg="ExecSync for \"e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33 not found: not found" Dec 13 02:00:46.485393 kubelet[2076]: E1213 02:00:46.485352 2076 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33 not found: not found" containerID="e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 02:00:46.488527 env[1219]: time="2024-12-13T02:00:46.488502403Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:00:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3370 runtime=io.containerd.runc.v2\n" Dec 13 02:00:46.893601 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33-rootfs.mount: Deactivated successfully. Dec 13 02:00:47.196849 env[1219]: time="2024-12-13T02:00:47.196734442Z" level=info msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\"" Dec 13 02:00:47.216604 env[1219]: time="2024-12-13T02:00:47.216528279Z" level=error msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" failed" error="failed to destroy network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:47.216789 kubelet[2076]: E1213 02:00:47.216751 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:00:47.216836 kubelet[2076]: E1213 02:00:47.216800 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4"} Dec 13 02:00:47.216836 kubelet[2076]: E1213 02:00:47.216829 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:47.216943 kubelet[2076]: E1213 02:00:47.216854 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:00:47.328909 kubelet[2076]: I1213 02:00:47.328224 2076 scope.go:117] "RemoveContainer" containerID="e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33" Dec 13 02:00:47.328909 kubelet[2076]: E1213 02:00:47.328296 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:47.330863 env[1219]: time="2024-12-13T02:00:47.330833398Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 02:00:47.345380 env[1219]: time="2024-12-13T02:00:47.345326895Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a\"" Dec 13 02:00:47.345821 env[1219]: time="2024-12-13T02:00:47.345799483Z" level=info msg="StartContainer for \"0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a\"" Dec 13 02:00:47.360586 systemd[1]: Started cri-containerd-0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a.scope. Dec 13 02:00:47.370000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.370000 audit[3414]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4cf551d0a0 items=0 ppid=2533 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:47.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066373665663935623634393730653839633861633739613961393435 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit: BPF prog-id=136 op=LOAD Dec 13 02:00:47.371000 audit[3414]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000330d78 items=0 ppid=2533 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:47.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066373665663935623634393730653839633861633739613961393435 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit: BPF prog-id=137 op=LOAD Dec 13 02:00:47.371000 audit[3414]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000330dc8 items=0 ppid=2533 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:47.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066373665663935623634393730653839633861633739613961393435 Dec 13 02:00:47.371000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:00:47.371000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:00:47.371000 audit: BPF prog-id=138 op=LOAD Dec 13 02:00:47.371000 audit[3414]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000330e58 items=0 ppid=2533 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:47.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066373665663935623634393730653839633861633739613961393435 Dec 13 02:00:47.385077 env[1219]: time="2024-12-13T02:00:47.385035992Z" level=info msg="StartContainer for \"0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a\" returns successfully" Dec 13 02:00:47.430628 systemd[1]: cri-containerd-0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a.scope: Deactivated successfully. Dec 13 02:00:47.435000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:00:47.453158 env[1219]: time="2024-12-13T02:00:47.453038471Z" level=info msg="shim disconnected" id=0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a Dec 13 02:00:47.453158 env[1219]: time="2024-12-13T02:00:47.453095531Z" level=warning msg="cleaning up after shim disconnected" id=0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a namespace=k8s.io Dec 13 02:00:47.453158 env[1219]: time="2024-12-13T02:00:47.453106682Z" level=info msg="cleaning up dead shim" Dec 13 02:00:47.459035 env[1219]: time="2024-12-13T02:00:47.458989641Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:00:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3457 runtime=io.containerd.runc.v2\n" Dec 13 02:00:47.893097 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a-rootfs.mount: Deactivated successfully. Dec 13 02:00:48.186679 kubelet[2076]: I1213 02:00:48.186590 2076 scope.go:117] "RemoveContainer" containerID="e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33" Dec 13 02:00:48.187804 env[1219]: time="2024-12-13T02:00:48.187776289Z" level=info msg="RemoveContainer for \"e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33\"" Dec 13 02:00:48.191064 env[1219]: time="2024-12-13T02:00:48.191038060Z" level=info msg="RemoveContainer for \"e635493e4dbcbdd646b14962ecd1958f344982adcc82a614e2ad9702e1a30e33\" returns successfully" Dec 13 02:00:48.196792 env[1219]: time="2024-12-13T02:00:48.196762518Z" level=info msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\"" Dec 13 02:00:48.217390 env[1219]: time="2024-12-13T02:00:48.217338704Z" level=error msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" failed" error="failed to destroy network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:48.217702 kubelet[2076]: E1213 02:00:48.217551 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:00:48.217702 kubelet[2076]: E1213 02:00:48.217600 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00"} Dec 13 02:00:48.217702 kubelet[2076]: E1213 02:00:48.217644 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:48.217702 kubelet[2076]: E1213 02:00:48.217666 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" podUID="1184bdee-ddbd-4572-9358-2e64b0d4fb76" Dec 13 02:00:48.332477 kubelet[2076]: I1213 02:00:48.332447 2076 scope.go:117] "RemoveContainer" containerID="0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a" Dec 13 02:00:48.332953 kubelet[2076]: E1213 02:00:48.332530 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:48.334111 kubelet[2076]: E1213 02:00:48.334073 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-pf9vh_calico-system(22e01492-f5d8-4cd0-a5e3-8866ada8945d)\"" pod="calico-system/calico-node-pf9vh" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" Dec 13 02:00:49.197233 env[1219]: time="2024-12-13T02:00:49.197177216Z" level=info msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\"" Dec 13 02:00:49.197407 env[1219]: time="2024-12-13T02:00:49.197383031Z" level=info msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\"" Dec 13 02:00:49.197552 env[1219]: time="2024-12-13T02:00:49.197520024Z" level=info msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\"" Dec 13 02:00:49.225276 env[1219]: time="2024-12-13T02:00:49.225211776Z" level=error msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" failed" error="failed to destroy network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:49.225645 kubelet[2076]: E1213 02:00:49.225430 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:00:49.225645 kubelet[2076]: E1213 02:00:49.225482 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38"} Dec 13 02:00:49.225645 kubelet[2076]: E1213 02:00:49.225513 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:49.225645 kubelet[2076]: E1213 02:00:49.225533 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" podUID="84cc8599-b8a8-43d2-8b5c-5a022da5fb55" Dec 13 02:00:49.225823 env[1219]: time="2024-12-13T02:00:49.225726694Z" level=error msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" failed" error="failed to destroy network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:49.225909 kubelet[2076]: E1213 02:00:49.225875 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:00:49.225909 kubelet[2076]: E1213 02:00:49.225904 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea"} Dec 13 02:00:49.226117 kubelet[2076]: E1213 02:00:49.225922 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88080b51-d429-4316-8cdf-3f4303a92112\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:49.226117 kubelet[2076]: E1213 02:00:49.225953 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88080b51-d429-4316-8cdf-3f4303a92112\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4qj2w" podUID="88080b51-d429-4316-8cdf-3f4303a92112" Dec 13 02:00:49.226231 env[1219]: time="2024-12-13T02:00:49.226002252Z" level=error msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\" failed" error="failed to destroy network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:00:49.226380 kubelet[2076]: E1213 02:00:49.226120 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:00:49.226380 kubelet[2076]: E1213 02:00:49.226169 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9"} Dec 13 02:00:49.226380 kubelet[2076]: E1213 02:00:49.226205 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"29d76287-050b-45b1-afc1-918e6f3fd86b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:00:49.226380 kubelet[2076]: E1213 02:00:49.226227 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"29d76287-050b-45b1-afc1-918e6f3fd86b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6b995bdd-46kpn" podUID="29d76287-050b-45b1-afc1-918e6f3fd86b" Dec 13 02:00:49.334051 kubelet[2076]: I1213 02:00:49.334016 2076 scope.go:117] "RemoveContainer" containerID="0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a" Dec 13 02:00:49.334402 kubelet[2076]: E1213 02:00:49.334096 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:49.334484 kubelet[2076]: E1213 02:00:49.334462 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-pf9vh_calico-system(22e01492-f5d8-4cd0-a5e3-8866ada8945d)\"" pod="calico-system/calico-node-pf9vh" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" Dec 13 02:00:50.885338 systemd[1]: Started sshd@15-10.0.0.133:22-10.0.0.1:52692.service. Dec 13 02:00:50.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.133:22-10.0.0.1:52692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:50.886433 kernel: kauditd_printk_skb: 107 callbacks suppressed Dec 13 02:00:50.886567 kernel: audit: type=1130 audit(1734055250.884:1095): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.133:22-10.0.0.1:52692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:50.918000 audit[3565]: USER_ACCT pid=3565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:50.919791 sshd[3565]: Accepted publickey for core from 10.0.0.1 port 52692 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:50.922000 audit[3565]: CRED_ACQ pid=3565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:50.924190 sshd[3565]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:50.927963 kernel: audit: type=1101 audit(1734055250.918:1096): pid=3565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:50.928036 kernel: audit: type=1103 audit(1734055250.922:1097): pid=3565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:50.928060 kernel: audit: type=1006 audit(1734055250.922:1098): pid=3565 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:00:50.927418 systemd-logind[1206]: New session 16 of user core. Dec 13 02:00:50.928575 systemd[1]: Started session-16.scope. Dec 13 02:00:50.922000 audit[3565]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8c819390 a2=3 a3=0 items=0 ppid=1 pid=3565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:50.934946 kernel: audit: type=1300 audit(1734055250.922:1098): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8c819390 a2=3 a3=0 items=0 ppid=1 pid=3565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:50.934996 kernel: audit: type=1327 audit(1734055250.922:1098): proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:50.922000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:50.932000 audit[3565]: USER_START pid=3565 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:50.940470 kernel: audit: type=1105 audit(1734055250.932:1099): pid=3565 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:50.940513 kernel: audit: type=1103 audit(1734055250.933:1100): pid=3567 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:50.933000 audit[3567]: CRED_ACQ pid=3567 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:51.028686 sshd[3565]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:51.028000 audit[3565]: USER_END pid=3565 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:51.031435 systemd[1]: sshd@15-10.0.0.133:22-10.0.0.1:52692.service: Deactivated successfully. Dec 13 02:00:51.032296 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:00:51.032829 systemd-logind[1206]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:00:51.033618 systemd-logind[1206]: Removed session 16. Dec 13 02:00:51.028000 audit[3565]: CRED_DISP pid=3565 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:51.038506 kernel: audit: type=1106 audit(1734055251.028:1101): pid=3565 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:51.038567 kernel: audit: type=1104 audit(1734055251.028:1102): pid=3565 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:51.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.133:22-10.0.0.1:52692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.032928 systemd[1]: Started sshd@16-10.0.0.133:22-10.0.0.1:53666.service. Dec 13 02:00:56.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.133:22-10.0.0.1:53666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.034183 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:00:56.034296 kernel: audit: type=1130 audit(1734055256.032:1104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.133:22-10.0.0.1:53666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.063000 audit[3579]: USER_ACCT pid=3579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.064315 sshd[3579]: Accepted publickey for core from 10.0.0.1 port 53666 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:00:56.067000 audit[3579]: CRED_ACQ pid=3579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.068594 sshd[3579]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:56.072524 kernel: audit: type=1101 audit(1734055256.063:1105): pid=3579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.072572 kernel: audit: type=1103 audit(1734055256.067:1106): pid=3579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.072593 kernel: audit: type=1006 audit(1734055256.067:1107): pid=3579 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 02:00:56.071632 systemd-logind[1206]: New session 17 of user core. Dec 13 02:00:56.072420 systemd[1]: Started session-17.scope. Dec 13 02:00:56.067000 audit[3579]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd81ae7550 a2=3 a3=0 items=0 ppid=1 pid=3579 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:56.078180 kernel: audit: type=1300 audit(1734055256.067:1107): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd81ae7550 a2=3 a3=0 items=0 ppid=1 pid=3579 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:56.078224 kernel: audit: type=1327 audit(1734055256.067:1107): proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:56.067000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:00:56.079497 kernel: audit: type=1105 audit(1734055256.075:1108): pid=3579 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.075000 audit[3579]: USER_START pid=3579 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.083650 kernel: audit: type=1103 audit(1734055256.076:1109): pid=3581 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.076000 audit[3581]: CRED_ACQ pid=3581 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.171610 sshd[3579]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:56.171000 audit[3579]: USER_END pid=3579 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.173561 systemd[1]: sshd@16-10.0.0.133:22-10.0.0.1:53666.service: Deactivated successfully. Dec 13 02:00:56.174195 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:00:56.174649 systemd-logind[1206]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:00:56.175252 systemd-logind[1206]: Removed session 17. Dec 13 02:00:56.171000 audit[3579]: CRED_DISP pid=3579 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.180357 kernel: audit: type=1106 audit(1734055256.171:1110): pid=3579 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.180416 kernel: audit: type=1104 audit(1734055256.171:1111): pid=3579 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:00:56.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.133:22-10.0.0.1:53666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:58.197641 kubelet[2076]: E1213 02:00:58.197585 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:00:59.964000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:59.964000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e6c520 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:00:59.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:00:59.964000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:59.964000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ea7460 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:00:59.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:00:59.964000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:59.964000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea7480 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:00:59.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:00:59.964000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:00:59.964000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002551180 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:00:59.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:00.197188 kubelet[2076]: I1213 02:01:00.197162 2076 scope.go:117] "RemoveContainer" containerID="0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a" Dec 13 02:01:00.197547 kubelet[2076]: E1213 02:01:00.197532 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:00.197607 env[1219]: time="2024-12-13T02:01:00.197574465Z" level=info msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\"" Dec 13 02:01:00.200166 env[1219]: time="2024-12-13T02:01:00.200125251Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Dec 13 02:01:00.212555 env[1219]: time="2024-12-13T02:01:00.212515310Z" level=info msg="CreateContainer within sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1\"" Dec 13 02:01:00.213127 env[1219]: time="2024-12-13T02:01:00.213093212Z" level=info msg="StartContainer for \"14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1\"" Dec 13 02:01:00.230686 env[1219]: time="2024-12-13T02:01:00.229471889Z" level=error msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" failed" error="failed to destroy network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:00.230806 kubelet[2076]: E1213 02:01:00.229706 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:00.230806 kubelet[2076]: E1213 02:01:00.229759 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4"} Dec 13 02:01:00.230806 kubelet[2076]: E1213 02:01:00.229791 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:00.230806 kubelet[2076]: E1213 02:01:00.229812 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:01:00.233432 systemd[1]: Started cri-containerd-14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1.scope. Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f63665c92f8 items=0 ppid=2533 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:00.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633335373863363562376539366332346163366332396464636233 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit: BPF prog-id=139 op=LOAD Dec 13 02:01:00.247000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000025218 items=0 ppid=2533 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:00.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633335373863363562376539366332346163366332396464636233 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit: BPF prog-id=140 op=LOAD Dec 13 02:01:00.247000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000025268 items=0 ppid=2533 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:00.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633335373863363562376539366332346163366332396464636233 Dec 13 02:01:00.247000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:01:00.247000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:00.247000 audit: BPF prog-id=141 op=LOAD Dec 13 02:01:00.247000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0000252f8 items=0 ppid=2533 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:00.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633335373863363562376539366332346163366332396464636233 Dec 13 02:01:00.261446 env[1219]: time="2024-12-13T02:01:00.261363261Z" level=info msg="StartContainer for \"14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1\" returns successfully" Dec 13 02:01:00.308263 systemd[1]: cri-containerd-14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1.scope: Deactivated successfully. Dec 13 02:01:00.312000 audit: BPF prog-id=141 op=UNLOAD Dec 13 02:01:00.324157 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1-rootfs.mount: Deactivated successfully. Dec 13 02:01:00.330432 env[1219]: time="2024-12-13T02:01:00.330371124Z" level=info msg="shim disconnected" id=14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1 Dec 13 02:01:00.330539 env[1219]: time="2024-12-13T02:01:00.330432351Z" level=warning msg="cleaning up after shim disconnected" id=14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1 namespace=k8s.io Dec 13 02:01:00.330539 env[1219]: time="2024-12-13T02:01:00.330444485Z" level=info msg="cleaning up dead shim" Dec 13 02:01:00.336691 env[1219]: time="2024-12-13T02:01:00.336651566Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:01:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3665 runtime=io.containerd.runc.v2\n" Dec 13 02:01:00.356528 kubelet[2076]: I1213 02:01:00.356505 2076 scope.go:117] "RemoveContainer" containerID="0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a" Dec 13 02:01:00.356875 kubelet[2076]: I1213 02:01:00.356785 2076 scope.go:117] "RemoveContainer" containerID="14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1" Dec 13 02:01:00.356875 kubelet[2076]: E1213 02:01:00.356856 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:00.357243 kubelet[2076]: E1213 02:01:00.357219 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-pf9vh_calico-system(22e01492-f5d8-4cd0-a5e3-8866ada8945d)\"" pod="calico-system/calico-node-pf9vh" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" Dec 13 02:01:00.357719 env[1219]: time="2024-12-13T02:01:00.357681808Z" level=info msg="RemoveContainer for \"0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a\"" Dec 13 02:01:00.360627 env[1219]: time="2024-12-13T02:01:00.360581219Z" level=info msg="RemoveContainer for \"0f76ef95b64970e89c8ac79a9a945fcc9a15d3fff170142996047b6a6b6e1b4a\" returns successfully" Dec 13 02:01:01.175643 systemd[1]: Started sshd@17-10.0.0.133:22-10.0.0.1:53672.service. Dec 13 02:01:01.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.133:22-10.0.0.1:53672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:01.176698 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 02:01:01.176751 kernel: audit: type=1130 audit(1734055261.174:1124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.133:22-10.0.0.1:53672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:01.198190 env[1219]: time="2024-12-13T02:01:01.198160118Z" level=info msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\"" Dec 13 02:01:01.209000 audit[3678]: USER_ACCT pid=3678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.210449 sshd[3678]: Accepted publickey for core from 10.0.0.1 port 53672 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:01.212538 sshd[3678]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:01.211000 audit[3678]: CRED_ACQ pid=3678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.218135 kernel: audit: type=1101 audit(1734055261.209:1125): pid=3678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.218195 kernel: audit: type=1103 audit(1734055261.211:1126): pid=3678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.218252 kernel: audit: type=1006 audit(1734055261.211:1127): pid=3678 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 02:01:01.217735 systemd-logind[1206]: New session 18 of user core. Dec 13 02:01:01.218055 systemd[1]: Started session-18.scope. Dec 13 02:01:01.211000 audit[3678]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8b31ca0 a2=3 a3=0 items=0 ppid=1 pid=3678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:01.224965 kernel: audit: type=1300 audit(1734055261.211:1127): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8b31ca0 a2=3 a3=0 items=0 ppid=1 pid=3678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:01.225012 kernel: audit: type=1327 audit(1734055261.211:1127): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:01.211000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:01.229487 kernel: audit: type=1105 audit(1734055261.222:1128): pid=3678 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.222000 audit[3678]: USER_START pid=3678 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.233099 kernel: audit: type=1103 audit(1734055261.223:1129): pid=3702 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.223000 audit[3702]: CRED_ACQ pid=3702 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.233888 env[1219]: time="2024-12-13T02:01:01.233833898Z" level=error msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" failed" error="failed to destroy network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:01.234128 kubelet[2076]: E1213 02:01:01.234081 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:01.234456 kubelet[2076]: E1213 02:01:01.234130 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00"} Dec 13 02:01:01.234456 kubelet[2076]: E1213 02:01:01.234161 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:01.234456 kubelet[2076]: E1213 02:01:01.234182 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" podUID="1184bdee-ddbd-4572-9358-2e64b0d4fb76" Dec 13 02:01:01.321976 sshd[3678]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:01.321000 audit[3678]: USER_END pid=3678 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.324550 systemd[1]: sshd@17-10.0.0.133:22-10.0.0.1:53672.service: Deactivated successfully. Dec 13 02:01:01.325294 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:01:01.325826 systemd-logind[1206]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:01:01.326669 systemd-logind[1206]: Removed session 18. Dec 13 02:01:01.321000 audit[3678]: CRED_DISP pid=3678 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.331026 kernel: audit: type=1106 audit(1734055261.321:1130): pid=3678 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.331085 kernel: audit: type=1104 audit(1734055261.321:1131): pid=3678 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:01.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.133:22-10.0.0.1:53672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:01.360602 kubelet[2076]: I1213 02:01:01.360580 2076 scope.go:117] "RemoveContainer" containerID="14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1" Dec 13 02:01:01.360684 kubelet[2076]: E1213 02:01:01.360631 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:01.361047 kubelet[2076]: E1213 02:01:01.360995 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-pf9vh_calico-system(22e01492-f5d8-4cd0-a5e3-8866ada8945d)\"" pod="calico-system/calico-node-pf9vh" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" Dec 13 02:01:02.197628 env[1219]: time="2024-12-13T02:01:02.197571061Z" level=info msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\"" Dec 13 02:01:02.197974 env[1219]: time="2024-12-13T02:01:02.197583715Z" level=info msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\"" Dec 13 02:01:02.218915 env[1219]: time="2024-12-13T02:01:02.218826459Z" level=error msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" failed" error="failed to destroy network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:02.219234 kubelet[2076]: E1213 02:01:02.219085 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:02.219234 kubelet[2076]: E1213 02:01:02.219144 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03"} Dec 13 02:01:02.219234 kubelet[2076]: E1213 02:01:02.219178 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:02.219234 kubelet[2076]: E1213 02:01:02.219204 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v6gs7" podUID="0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0" Dec 13 02:01:02.221666 env[1219]: time="2024-12-13T02:01:02.221622550Z" level=error msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" failed" error="failed to destroy network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:02.221737 kubelet[2076]: E1213 02:01:02.221715 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:02.221773 kubelet[2076]: E1213 02:01:02.221741 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea"} Dec 13 02:01:02.221773 kubelet[2076]: E1213 02:01:02.221763 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88080b51-d429-4316-8cdf-3f4303a92112\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:02.221841 kubelet[2076]: E1213 02:01:02.221779 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88080b51-d429-4316-8cdf-3f4303a92112\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4qj2w" podUID="88080b51-d429-4316-8cdf-3f4303a92112" Dec 13 02:01:04.198155 env[1219]: time="2024-12-13T02:01:04.197494201Z" level=info msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\"" Dec 13 02:01:04.198155 env[1219]: time="2024-12-13T02:01:04.197507477Z" level=info msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\"" Dec 13 02:01:04.224532 env[1219]: time="2024-12-13T02:01:04.224482279Z" level=error msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\" failed" error="failed to destroy network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:04.224842 env[1219]: time="2024-12-13T02:01:04.224710753Z" level=error msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" failed" error="failed to destroy network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:04.224977 kubelet[2076]: E1213 02:01:04.224902 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:04.224977 kubelet[2076]: E1213 02:01:04.224973 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9"} Dec 13 02:01:04.225360 kubelet[2076]: E1213 02:01:04.225036 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"29d76287-050b-45b1-afc1-918e6f3fd86b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:04.225360 kubelet[2076]: E1213 02:01:04.225066 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"29d76287-050b-45b1-afc1-918e6f3fd86b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6b995bdd-46kpn" podUID="29d76287-050b-45b1-afc1-918e6f3fd86b" Dec 13 02:01:04.225360 kubelet[2076]: E1213 02:01:04.225028 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:04.225360 kubelet[2076]: E1213 02:01:04.225097 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38"} Dec 13 02:01:04.225534 kubelet[2076]: E1213 02:01:04.225114 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:04.225534 kubelet[2076]: E1213 02:01:04.225130 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" podUID="84cc8599-b8a8-43d2-8b5c-5a022da5fb55" Dec 13 02:01:06.325552 systemd[1]: Started sshd@18-10.0.0.133:22-10.0.0.1:52156.service. Dec 13 02:01:06.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.133:22-10.0.0.1:52156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:06.326713 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:01:06.326779 kernel: audit: type=1130 audit(1734055266.324:1133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.133:22-10.0.0.1:52156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:06.357000 audit[3811]: USER_ACCT pid=3811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.358926 sshd[3811]: Accepted publickey for core from 10.0.0.1 port 52156 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:06.362000 audit[3811]: CRED_ACQ pid=3811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.363401 sshd[3811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:06.367278 kernel: audit: type=1101 audit(1734055266.357:1134): pid=3811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.367341 kernel: audit: type=1103 audit(1734055266.362:1135): pid=3811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.366987 systemd-logind[1206]: New session 19 of user core. Dec 13 02:01:06.370381 kernel: audit: type=1006 audit(1734055266.362:1136): pid=3811 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 02:01:06.370618 kernel: audit: type=1300 audit(1734055266.362:1136): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde98cae00 a2=3 a3=0 items=0 ppid=1 pid=3811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:06.362000 audit[3811]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde98cae00 a2=3 a3=0 items=0 ppid=1 pid=3811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:06.370188 systemd[1]: Started session-19.scope. Dec 13 02:01:06.374734 kernel: audit: type=1327 audit(1734055266.362:1136): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:06.362000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:06.380709 kernel: audit: type=1105 audit(1734055266.374:1137): pid=3811 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.374000 audit[3811]: USER_START pid=3811 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.375000 audit[3813]: CRED_ACQ pid=3813 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.384252 kernel: audit: type=1103 audit(1734055266.375:1138): pid=3813 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.470787 sshd[3811]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:06.470000 audit[3811]: USER_END pid=3811 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.473175 systemd[1]: sshd@18-10.0.0.133:22-10.0.0.1:52156.service: Deactivated successfully. Dec 13 02:01:06.473859 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:01:06.470000 audit[3811]: CRED_DISP pid=3811 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.479443 kernel: audit: type=1106 audit(1734055266.470:1139): pid=3811 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.479510 kernel: audit: type=1104 audit(1734055266.470:1140): pid=3811 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:06.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.133:22-10.0.0.1:52156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:06.480009 systemd-logind[1206]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:01:06.480705 systemd-logind[1206]: Removed session 19. Dec 13 02:01:07.196718 kubelet[2076]: E1213 02:01:07.196682 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:09.791543 kubelet[2076]: I1213 02:01:09.791504 2076 scope.go:117] "RemoveContainer" containerID="14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1" Dec 13 02:01:09.791889 kubelet[2076]: E1213 02:01:09.791561 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:09.791930 kubelet[2076]: E1213 02:01:09.791910 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-pf9vh_calico-system(22e01492-f5d8-4cd0-a5e3-8866ada8945d)\"" pod="calico-system/calico-node-pf9vh" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" Dec 13 02:01:11.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.133:22-10.0.0.1:52158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:11.474208 systemd[1]: Started sshd@19-10.0.0.133:22-10.0.0.1:52158.service. Dec 13 02:01:11.475303 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:01:11.475348 kernel: audit: type=1130 audit(1734055271.473:1142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.133:22-10.0.0.1:52158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:11.504000 audit[3824]: USER_ACCT pid=3824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.505831 sshd[3824]: Accepted publickey for core from 10.0.0.1 port 52158 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:11.507435 sshd[3824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:11.506000 audit[3824]: CRED_ACQ pid=3824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.511053 systemd-logind[1206]: New session 20 of user core. Dec 13 02:01:11.511492 systemd[1]: Started session-20.scope. Dec 13 02:01:11.513034 kernel: audit: type=1101 audit(1734055271.504:1143): pid=3824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.513081 kernel: audit: type=1103 audit(1734055271.506:1144): pid=3824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.513098 kernel: audit: type=1006 audit(1734055271.506:1145): pid=3824 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 02:01:11.506000 audit[3824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff08f96500 a2=3 a3=0 items=0 ppid=1 pid=3824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:11.519232 kernel: audit: type=1300 audit(1734055271.506:1145): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff08f96500 a2=3 a3=0 items=0 ppid=1 pid=3824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:11.519281 kernel: audit: type=1327 audit(1734055271.506:1145): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:11.506000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:11.520545 kernel: audit: type=1105 audit(1734055271.514:1146): pid=3824 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.514000 audit[3824]: USER_START pid=3824 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.524716 kernel: audit: type=1103 audit(1734055271.515:1147): pid=3826 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.515000 audit[3826]: CRED_ACQ pid=3826 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.607511 sshd[3824]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:11.607000 audit[3824]: USER_END pid=3824 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.609893 systemd[1]: sshd@19-10.0.0.133:22-10.0.0.1:52158.service: Deactivated successfully. Dec 13 02:01:11.610581 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:01:11.611314 systemd-logind[1206]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:01:11.611991 systemd-logind[1206]: Removed session 20. Dec 13 02:01:11.607000 audit[3824]: CRED_DISP pid=3824 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.616065 kernel: audit: type=1106 audit(1734055271.607:1148): pid=3824 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.616112 kernel: audit: type=1104 audit(1734055271.607:1149): pid=3824 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:11.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.133:22-10.0.0.1:52158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:13.197629 env[1219]: time="2024-12-13T02:01:13.197569160Z" level=info msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\"" Dec 13 02:01:13.198060 env[1219]: time="2024-12-13T02:01:13.198034103Z" level=info msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\"" Dec 13 02:01:13.220280 env[1219]: time="2024-12-13T02:01:13.220222196Z" level=error msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" failed" error="failed to destroy network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:13.220489 kubelet[2076]: E1213 02:01:13.220435 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:13.220489 kubelet[2076]: E1213 02:01:13.220491 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4"} Dec 13 02:01:13.220836 kubelet[2076]: E1213 02:01:13.220520 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:13.220836 kubelet[2076]: E1213 02:01:13.220542 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v75ck" podUID="2bd5041f-f9cd-42cf-a423-3f4b7c4eecee" Dec 13 02:01:13.221373 env[1219]: time="2024-12-13T02:01:13.221319891Z" level=error msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" failed" error="failed to destroy network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:13.221484 kubelet[2076]: E1213 02:01:13.221443 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:13.221484 kubelet[2076]: E1213 02:01:13.221479 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00"} Dec 13 02:01:13.221554 kubelet[2076]: E1213 02:01:13.221505 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:13.221554 kubelet[2076]: E1213 02:01:13.221529 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1184bdee-ddbd-4572-9358-2e64b0d4fb76\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" podUID="1184bdee-ddbd-4572-9358-2e64b0d4fb76" Dec 13 02:01:14.197733 kubelet[2076]: E1213 02:01:14.197696 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:14.197917 env[1219]: time="2024-12-13T02:01:14.197836677Z" level=info msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\"" Dec 13 02:01:14.198411 env[1219]: time="2024-12-13T02:01:14.198352166Z" level=info msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\"" Dec 13 02:01:14.231097 env[1219]: time="2024-12-13T02:01:14.231021508Z" level=error msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" failed" error="failed to destroy network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:14.231250 env[1219]: time="2024-12-13T02:01:14.231150823Z" level=error msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" failed" error="failed to destroy network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:14.231489 kubelet[2076]: E1213 02:01:14.231442 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:14.231766 kubelet[2076]: E1213 02:01:14.231479 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:14.231766 kubelet[2076]: E1213 02:01:14.231507 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea"} Dec 13 02:01:14.231766 kubelet[2076]: E1213 02:01:14.231537 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03"} Dec 13 02:01:14.231766 kubelet[2076]: E1213 02:01:14.231551 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88080b51-d429-4316-8cdf-3f4303a92112\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:14.231766 kubelet[2076]: E1213 02:01:14.231581 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88080b51-d429-4316-8cdf-3f4303a92112\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4qj2w" podUID="88080b51-d429-4316-8cdf-3f4303a92112" Dec 13 02:01:14.231969 kubelet[2076]: E1213 02:01:14.231586 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:14.231969 kubelet[2076]: E1213 02:01:14.231638 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v6gs7" podUID="0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0" Dec 13 02:01:14.555154 env[1219]: time="2024-12-13T02:01:14.555047251Z" level=info msg="StopPodSandbox for \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\"" Dec 13 02:01:14.555494 env[1219]: time="2024-12-13T02:01:14.555461759Z" level=info msg="Container to stop \"44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:01:14.555621 env[1219]: time="2024-12-13T02:01:14.555569423Z" level=info msg="Container to stop \"7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:01:14.555621 env[1219]: time="2024-12-13T02:01:14.555590834Z" level=info msg="Container to stop \"14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:01:14.560013 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3-shm.mount: Deactivated successfully. Dec 13 02:01:14.568329 systemd[1]: cri-containerd-5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3.scope: Deactivated successfully. Dec 13 02:01:14.567000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:01:14.571000 audit: BPF prog-id=118 op=UNLOAD Dec 13 02:01:14.586359 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3-rootfs.mount: Deactivated successfully. Dec 13 02:01:14.596570 env[1219]: time="2024-12-13T02:01:14.596513166Z" level=info msg="shim disconnected" id=5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3 Dec 13 02:01:14.596570 env[1219]: time="2024-12-13T02:01:14.596565124Z" level=warning msg="cleaning up after shim disconnected" id=5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3 namespace=k8s.io Dec 13 02:01:14.596570 env[1219]: time="2024-12-13T02:01:14.596573611Z" level=info msg="cleaning up dead shim" Dec 13 02:01:14.604865 env[1219]: time="2024-12-13T02:01:14.604818736Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:01:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3954 runtime=io.containerd.runc.v2\n" Dec 13 02:01:14.605137 env[1219]: time="2024-12-13T02:01:14.605103287Z" level=info msg="TearDown network for sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" successfully" Dec 13 02:01:14.605137 env[1219]: time="2024-12-13T02:01:14.605130949Z" level=info msg="StopPodSandbox for \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" returns successfully" Dec 13 02:01:14.635194 kubelet[2076]: I1213 02:01:14.635147 2076 topology_manager.go:215] "Topology Admit Handler" podUID="def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3" podNamespace="calico-system" podName="calico-node-mxv4f" Dec 13 02:01:14.635385 kubelet[2076]: E1213 02:01:14.635213 2076 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" containerName="flexvol-driver" Dec 13 02:01:14.635385 kubelet[2076]: E1213 02:01:14.635222 2076 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" containerName="install-cni" Dec 13 02:01:14.635385 kubelet[2076]: E1213 02:01:14.635227 2076 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" containerName="calico-node" Dec 13 02:01:14.635385 kubelet[2076]: E1213 02:01:14.635232 2076 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" containerName="calico-node" Dec 13 02:01:14.635385 kubelet[2076]: I1213 02:01:14.635256 2076 memory_manager.go:354] "RemoveStaleState removing state" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" containerName="calico-node" Dec 13 02:01:14.635385 kubelet[2076]: I1213 02:01:14.635262 2076 memory_manager.go:354] "RemoveStaleState removing state" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" containerName="calico-node" Dec 13 02:01:14.635385 kubelet[2076]: I1213 02:01:14.635266 2076 memory_manager.go:354] "RemoveStaleState removing state" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" containerName="calico-node" Dec 13 02:01:14.635385 kubelet[2076]: E1213 02:01:14.635283 2076 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" containerName="calico-node" Dec 13 02:01:14.640139 systemd[1]: Created slice kubepods-besteffort-poddef26aa8_ef5a_43a2_9fa4_2b34dc83c4d3.slice. Dec 13 02:01:14.800662 kubelet[2076]: I1213 02:01:14.800619 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-net-dir\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.800662 kubelet[2076]: I1213 02:01:14.800660 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/22e01492-f5d8-4cd0-a5e3-8866ada8945d-tigera-ca-bundle\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.800662 kubelet[2076]: I1213 02:01:14.800677 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-log-dir\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.800662 kubelet[2076]: I1213 02:01:14.800689 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-var-run-calico\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.800927 kubelet[2076]: I1213 02:01:14.800705 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-lib-modules\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.800927 kubelet[2076]: I1213 02:01:14.800717 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-bin-dir\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.800927 kubelet[2076]: I1213 02:01:14.800716 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.800927 kubelet[2076]: I1213 02:01:14.800731 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-wvl4s\" (UniqueName: \"kubernetes.io/projected/22e01492-f5d8-4cd0-a5e3-8866ada8945d-kube-api-access-wvl4s\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.800927 kubelet[2076]: I1213 02:01:14.800799 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/22e01492-f5d8-4cd0-a5e3-8866ada8945d-node-certs\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.800927 kubelet[2076]: I1213 02:01:14.800815 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-flexvol-driver-host\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.801097 kubelet[2076]: I1213 02:01:14.800831 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-var-lib-calico\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.801097 kubelet[2076]: I1213 02:01:14.800846 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-xtables-lock\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.801097 kubelet[2076]: I1213 02:01:14.800861 2076 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-policysync\") pod \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\" (UID: \"22e01492-f5d8-4cd0-a5e3-8866ada8945d\") " Dec 13 02:01:14.801097 kubelet[2076]: I1213 02:01:14.800908 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-cni-bin-dir\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801097 kubelet[2076]: I1213 02:01:14.800898 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.801097 kubelet[2076]: I1213 02:01:14.800925 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-flexvol-driver-host\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801247 kubelet[2076]: I1213 02:01:14.800959 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-xtables-lock\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801247 kubelet[2076]: I1213 02:01:14.800972 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.801247 kubelet[2076]: I1213 02:01:14.800973 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-policysync\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801247 kubelet[2076]: I1213 02:01:14.801023 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-node-certs\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801247 kubelet[2076]: I1213 02:01:14.801054 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-cni-net-dir\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801369 kubelet[2076]: I1213 02:01:14.801068 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-var-lib-calico\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801369 kubelet[2076]: I1213 02:01:14.801084 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kxsrl\" (UniqueName: \"kubernetes.io/projected/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-kube-api-access-kxsrl\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801369 kubelet[2076]: I1213 02:01:14.801102 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-var-run-calico\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801369 kubelet[2076]: I1213 02:01:14.801121 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-lib-modules\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801369 kubelet[2076]: I1213 02:01:14.801135 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-cni-log-dir\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801505 kubelet[2076]: I1213 02:01:14.801153 2076 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3-tigera-ca-bundle\") pod \"calico-node-mxv4f\" (UID: \"def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3\") " pod="calico-system/calico-node-mxv4f" Dec 13 02:01:14.801505 kubelet[2076]: I1213 02:01:14.801176 2076 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-net-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.801505 kubelet[2076]: I1213 02:01:14.801185 2076 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-log-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.801505 kubelet[2076]: I1213 02:01:14.801192 2076 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-var-run-calico\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.801505 kubelet[2076]: I1213 02:01:14.801254 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.801505 kubelet[2076]: I1213 02:01:14.801271 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.801646 kubelet[2076]: I1213 02:01:14.801284 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-policysync" (OuterVolumeSpecName: "policysync") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.801646 kubelet[2076]: I1213 02:01:14.801296 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.801646 kubelet[2076]: I1213 02:01:14.801310 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.801646 kubelet[2076]: I1213 02:01:14.801322 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:01:14.805197 systemd[1]: var-lib-kubelet-pods-22e01492\x2df5d8\x2d4cd0\x2da5e3\x2d8866ada8945d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dwvl4s.mount: Deactivated successfully. Dec 13 02:01:14.805293 systemd[1]: var-lib-kubelet-pods-22e01492\x2df5d8\x2d4cd0\x2da5e3\x2d8866ada8945d-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 02:01:14.807492 systemd[1]: var-lib-kubelet-pods-22e01492\x2df5d8\x2d4cd0\x2da5e3\x2d8866ada8945d-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 02:01:14.808393 kubelet[2076]: I1213 02:01:14.808356 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/22e01492-f5d8-4cd0-a5e3-8866ada8945d-kube-api-access-wvl4s" (OuterVolumeSpecName: "kube-api-access-wvl4s") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "kube-api-access-wvl4s". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 02:01:14.808712 kubelet[2076]: I1213 02:01:14.808692 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/22e01492-f5d8-4cd0-a5e3-8866ada8945d-node-certs" (OuterVolumeSpecName: "node-certs") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 02:01:14.808990 kubelet[2076]: I1213 02:01:14.808967 2076 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/22e01492-f5d8-4cd0-a5e3-8866ada8945d-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "22e01492-f5d8-4cd0-a5e3-8866ada8945d" (UID: "22e01492-f5d8-4cd0-a5e3-8866ada8945d"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 02:01:14.901435 kubelet[2076]: I1213 02:01:14.901408 2076 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/22e01492-f5d8-4cd0-a5e3-8866ada8945d-node-certs\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.901492 kubelet[2076]: I1213 02:01:14.901453 2076 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-var-lib-calico\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.901492 kubelet[2076]: I1213 02:01:14.901474 2076 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-xtables-lock\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.901492 kubelet[2076]: I1213 02:01:14.901485 2076 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-lib-modules\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.901568 kubelet[2076]: I1213 02:01:14.901497 2076 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.901568 kubelet[2076]: I1213 02:01:14.901507 2076 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-policysync\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.901568 kubelet[2076]: I1213 02:01:14.901514 2076 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/22e01492-f5d8-4cd0-a5e3-8866ada8945d-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.901568 kubelet[2076]: I1213 02:01:14.901523 2076 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/22e01492-f5d8-4cd0-a5e3-8866ada8945d-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.901568 kubelet[2076]: I1213 02:01:14.901531 2076 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-wvl4s\" (UniqueName: \"kubernetes.io/projected/22e01492-f5d8-4cd0-a5e3-8866ada8945d-kube-api-access-wvl4s\") on node \"localhost\" DevicePath \"\"" Dec 13 02:01:14.942530 kubelet[2076]: E1213 02:01:14.942487 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:14.942962 env[1219]: time="2024-12-13T02:01:14.942905409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mxv4f,Uid:def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3,Namespace:calico-system,Attempt:0,}" Dec 13 02:01:14.955195 env[1219]: time="2024-12-13T02:01:14.955128658Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:14.955195 env[1219]: time="2024-12-13T02:01:14.955168154Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:14.955195 env[1219]: time="2024-12-13T02:01:14.955179425Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:14.955498 env[1219]: time="2024-12-13T02:01:14.955447403Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/13f3f95e83cde00d28c40e5e57ad5bc7b4d3460e51129ce67ed9a8a7a7d573f6 pid=3978 runtime=io.containerd.runc.v2 Dec 13 02:01:14.965563 systemd[1]: Started cri-containerd-13f3f95e83cde00d28c40e5e57ad5bc7b4d3460e51129ce67ed9a8a7a7d573f6.scope. Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit: BPF prog-id=142 op=LOAD Dec 13 02:01:14.975000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133663366393565383363646530306432386334306535653537616435 Dec 13 02:01:14.975000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.975000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133663366393565383363646530306432386334306535653537616435 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit: BPF prog-id=143 op=LOAD Dec 13 02:01:14.976000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028a2f0 items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133663366393565383363646530306432386334306535653537616435 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit: BPF prog-id=144 op=LOAD Dec 13 02:01:14.976000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028a338 items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133663366393565383363646530306432386334306535653537616435 Dec 13 02:01:14.976000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:01:14.976000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:14.976000 audit: BPF prog-id=145 op=LOAD Dec 13 02:01:14.976000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028a748 items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:14.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133663366393565383363646530306432386334306535653537616435 Dec 13 02:01:14.985279 env[1219]: time="2024-12-13T02:01:14.985235474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mxv4f,Uid:def26aa8-ef5a-43a2-9fa4-2b34dc83c4d3,Namespace:calico-system,Attempt:0,} returns sandbox id \"13f3f95e83cde00d28c40e5e57ad5bc7b4d3460e51129ce67ed9a8a7a7d573f6\"" Dec 13 02:01:14.985915 kubelet[2076]: E1213 02:01:14.985897 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:14.990173 env[1219]: time="2024-12-13T02:01:14.989614339Z" level=info msg="CreateContainer within sandbox \"13f3f95e83cde00d28c40e5e57ad5bc7b4d3460e51129ce67ed9a8a7a7d573f6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:01:15.007024 env[1219]: time="2024-12-13T02:01:15.006978968Z" level=info msg="CreateContainer within sandbox \"13f3f95e83cde00d28c40e5e57ad5bc7b4d3460e51129ce67ed9a8a7a7d573f6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1477448a02c6c9c86e61785c4dbef45775fe9d8f8c3c7ae2b1b0a8a77de7949a\"" Dec 13 02:01:15.007464 env[1219]: time="2024-12-13T02:01:15.007443138Z" level=info msg="StartContainer for \"1477448a02c6c9c86e61785c4dbef45775fe9d8f8c3c7ae2b1b0a8a77de7949a\"" Dec 13 02:01:15.022026 systemd[1]: Started cri-containerd-1477448a02c6c9c86e61785c4dbef45775fe9d8f8c3c7ae2b1b0a8a77de7949a.scope. Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff454e59848 items=0 ppid=3978 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134373734343861303263366339633836653631373835633464626566 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit: BPF prog-id=146 op=LOAD Dec 13 02:01:15.032000 audit[4019]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000306668 items=0 ppid=3978 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134373734343861303263366339633836653631373835633464626566 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit: BPF prog-id=147 op=LOAD Dec 13 02:01:15.032000 audit[4019]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003066b8 items=0 ppid=3978 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134373734343861303263366339633836653631373835633464626566 Dec 13 02:01:15.032000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:01:15.032000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { perfmon } for pid=4019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit[4019]: AVC avc: denied { bpf } for pid=4019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.032000 audit: BPF prog-id=148 op=LOAD Dec 13 02:01:15.032000 audit[4019]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000306748 items=0 ppid=3978 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134373734343861303263366339633836653631373835633464626566 Dec 13 02:01:15.048903 env[1219]: time="2024-12-13T02:01:15.048862204Z" level=info msg="StartContainer for \"1477448a02c6c9c86e61785c4dbef45775fe9d8f8c3c7ae2b1b0a8a77de7949a\" returns successfully" Dec 13 02:01:15.063224 systemd[1]: cri-containerd-1477448a02c6c9c86e61785c4dbef45775fe9d8f8c3c7ae2b1b0a8a77de7949a.scope: Deactivated successfully. Dec 13 02:01:15.068000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:01:15.112740 env[1219]: time="2024-12-13T02:01:15.112694064Z" level=info msg="shim disconnected" id=1477448a02c6c9c86e61785c4dbef45775fe9d8f8c3c7ae2b1b0a8a77de7949a Dec 13 02:01:15.112740 env[1219]: time="2024-12-13T02:01:15.112738148Z" level=warning msg="cleaning up after shim disconnected" id=1477448a02c6c9c86e61785c4dbef45775fe9d8f8c3c7ae2b1b0a8a77de7949a namespace=k8s.io Dec 13 02:01:15.112740 env[1219]: time="2024-12-13T02:01:15.112747435Z" level=info msg="cleaning up dead shim" Dec 13 02:01:15.118915 env[1219]: time="2024-12-13T02:01:15.118878253Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:01:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4057 runtime=io.containerd.runc.v2\n" Dec 13 02:01:15.197047 env[1219]: time="2024-12-13T02:01:15.197001102Z" level=info msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\"" Dec 13 02:01:15.219879 env[1219]: time="2024-12-13T02:01:15.219811873Z" level=error msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" failed" error="failed to destroy network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:01:15.220200 kubelet[2076]: E1213 02:01:15.220021 2076 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:15.220200 kubelet[2076]: E1213 02:01:15.220058 2076 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38"} Dec 13 02:01:15.220200 kubelet[2076]: E1213 02:01:15.220090 2076 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:01:15.220200 kubelet[2076]: E1213 02:01:15.220113 2076 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"84cc8599-b8a8-43d2-8b5c-5a022da5fb55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" podUID="84cc8599-b8a8-43d2-8b5c-5a022da5fb55" Dec 13 02:01:15.383256 kubelet[2076]: I1213 02:01:15.383231 2076 scope.go:117] "RemoveContainer" containerID="14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1" Dec 13 02:01:15.384092 env[1219]: time="2024-12-13T02:01:15.384057878Z" level=info msg="RemoveContainer for \"14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1\"" Dec 13 02:01:15.384865 kubelet[2076]: E1213 02:01:15.384838 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:15.386424 systemd[1]: Removed slice kubepods-besteffort-pod22e01492_f5d8_4cd0_a5e3_8866ada8945d.slice. Dec 13 02:01:15.388331 env[1219]: time="2024-12-13T02:01:15.388264182Z" level=info msg="RemoveContainer for \"14c3578c65b7e96c24ac6c29ddcb3b68a6e027fe44019db0b52ac570e1031dc1\" returns successfully" Dec 13 02:01:15.388476 kubelet[2076]: I1213 02:01:15.388382 2076 scope.go:117] "RemoveContainer" containerID="7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9" Dec 13 02:01:15.388874 env[1219]: time="2024-12-13T02:01:15.388811541Z" level=info msg="CreateContainer within sandbox \"13f3f95e83cde00d28c40e5e57ad5bc7b4d3460e51129ce67ed9a8a7a7d573f6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:01:15.390966 env[1219]: time="2024-12-13T02:01:15.390674027Z" level=info msg="RemoveContainer for \"7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9\"" Dec 13 02:01:15.394202 env[1219]: time="2024-12-13T02:01:15.394169191Z" level=info msg="RemoveContainer for \"7df8c2eac47785bf36dea083fa9f03965b0071dcc728c6940895157f88ef2eb9\" returns successfully" Dec 13 02:01:15.394374 kubelet[2076]: I1213 02:01:15.394337 2076 scope.go:117] "RemoveContainer" containerID="44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e" Dec 13 02:01:15.396875 env[1219]: time="2024-12-13T02:01:15.396143700Z" level=info msg="RemoveContainer for \"44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e\"" Dec 13 02:01:15.400544 env[1219]: time="2024-12-13T02:01:15.400520588Z" level=info msg="RemoveContainer for \"44b98c95e456d66b6ce990b8ae24be84dff68be7027768bcf34e488eba379e4e\" returns successfully" Dec 13 02:01:15.404547 env[1219]: time="2024-12-13T02:01:15.404499682Z" level=info msg="CreateContainer within sandbox \"13f3f95e83cde00d28c40e5e57ad5bc7b4d3460e51129ce67ed9a8a7a7d573f6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e8adc0d3b17f7638fec970b2cb39c0ead201e593f32bdf572f7e833ecab4900f\"" Dec 13 02:01:15.405011 env[1219]: time="2024-12-13T02:01:15.404970216Z" level=info msg="StartContainer for \"e8adc0d3b17f7638fec970b2cb39c0ead201e593f32bdf572f7e833ecab4900f\"" Dec 13 02:01:15.419029 systemd[1]: Started cri-containerd-e8adc0d3b17f7638fec970b2cb39c0ead201e593f32bdf572f7e833ecab4900f.scope. Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001196b0 a2=3c a3=7f00efc88ed8 items=0 ppid=3978 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538616463306433623137663736333866656339373062326362333963 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit: BPF prog-id=149 op=LOAD Dec 13 02:01:15.436000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001199d8 a2=78 a3=c0001bdfc8 items=0 ppid=3978 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538616463306433623137663736333866656339373062326362333963 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit: BPF prog-id=150 op=LOAD Dec 13 02:01:15.436000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000119770 a2=78 a3=c000408018 items=0 ppid=3978 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538616463306433623137663736333866656339373062326362333963 Dec 13 02:01:15.436000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:01:15.436000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:15.436000 audit: BPF prog-id=151 op=LOAD Dec 13 02:01:15.436000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000119c30 a2=78 a3=c0004080a8 items=0 ppid=3978 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:15.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538616463306433623137663736333866656339373062326362333963 Dec 13 02:01:15.452310 env[1219]: time="2024-12-13T02:01:15.452263401Z" level=info msg="StartContainer for \"e8adc0d3b17f7638fec970b2cb39c0ead201e593f32bdf572f7e833ecab4900f\" returns successfully" Dec 13 02:01:15.816907 systemd[1]: cri-containerd-e8adc0d3b17f7638fec970b2cb39c0ead201e593f32bdf572f7e833ecab4900f.scope: Deactivated successfully. Dec 13 02:01:15.820000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:01:15.834769 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e8adc0d3b17f7638fec970b2cb39c0ead201e593f32bdf572f7e833ecab4900f-rootfs.mount: Deactivated successfully. Dec 13 02:01:15.838720 env[1219]: time="2024-12-13T02:01:15.838670118Z" level=info msg="shim disconnected" id=e8adc0d3b17f7638fec970b2cb39c0ead201e593f32bdf572f7e833ecab4900f Dec 13 02:01:15.838720 env[1219]: time="2024-12-13T02:01:15.838714843Z" level=warning msg="cleaning up after shim disconnected" id=e8adc0d3b17f7638fec970b2cb39c0ead201e593f32bdf572f7e833ecab4900f namespace=k8s.io Dec 13 02:01:15.838843 env[1219]: time="2024-12-13T02:01:15.838724882Z" level=info msg="cleaning up dead shim" Dec 13 02:01:15.846150 env[1219]: time="2024-12-13T02:01:15.846107827Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:01:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4146 runtime=io.containerd.runc.v2\n" Dec 13 02:01:16.199257 kubelet[2076]: I1213 02:01:16.199217 2076 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="22e01492-f5d8-4cd0-a5e3-8866ada8945d" path="/var/lib/kubelet/pods/22e01492-f5d8-4cd0-a5e3-8866ada8945d/volumes" Dec 13 02:01:16.388231 kubelet[2076]: E1213 02:01:16.388035 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:16.394464 env[1219]: time="2024-12-13T02:01:16.394415084Z" level=info msg="CreateContainer within sandbox \"13f3f95e83cde00d28c40e5e57ad5bc7b4d3460e51129ce67ed9a8a7a7d573f6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:01:16.409921 env[1219]: time="2024-12-13T02:01:16.409866788Z" level=info msg="CreateContainer within sandbox \"13f3f95e83cde00d28c40e5e57ad5bc7b4d3460e51129ce67ed9a8a7a7d573f6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2c8bf3c82faa088e5cbc626ce3b02ac320f95b274e64f5e70200352e0be0ce4e\"" Dec 13 02:01:16.410279 env[1219]: time="2024-12-13T02:01:16.410248593Z" level=info msg="StartContainer for \"2c8bf3c82faa088e5cbc626ce3b02ac320f95b274e64f5e70200352e0be0ce4e\"" Dec 13 02:01:16.426965 systemd[1]: Started cri-containerd-2c8bf3c82faa088e5cbc626ce3b02ac320f95b274e64f5e70200352e0be0ce4e.scope. Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1db465b7a8 items=0 ppid=3978 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263386266336338326661613038386535636263363236636533623032 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.439000 audit: BPF prog-id=152 op=LOAD Dec 13 02:01:16.439000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00020eae8 items=0 ppid=3978 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263386266336338326661613038386535636263363236636533623032 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit: BPF prog-id=153 op=LOAD Dec 13 02:01:16.440000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00020eb38 items=0 ppid=3978 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263386266336338326661613038386535636263363236636533623032 Dec 13 02:01:16.440000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:01:16.440000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:16.440000 audit: BPF prog-id=154 op=LOAD Dec 13 02:01:16.440000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00020ebc8 items=0 ppid=3978 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263386266336338326661613038386535636263363236636533623032 Dec 13 02:01:16.454882 env[1219]: time="2024-12-13T02:01:16.454763292Z" level=info msg="StartContainer for \"2c8bf3c82faa088e5cbc626ce3b02ac320f95b274e64f5e70200352e0be0ce4e\" returns successfully" Dec 13 02:01:16.611457 systemd[1]: Started sshd@20-10.0.0.133:22-10.0.0.1:44626.service. Dec 13 02:01:16.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.133:22-10.0.0.1:44626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:16.612865 kernel: kauditd_printk_skb: 191 callbacks suppressed Dec 13 02:01:16.612929 kernel: audit: type=1130 audit(1734055276.610:1191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.133:22-10.0.0.1:44626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:16.651000 audit[4210]: USER_ACCT pid=4210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.652316 sshd[4210]: Accepted publickey for core from 10.0.0.1 port 44626 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:16.660524 kernel: audit: type=1101 audit(1734055276.651:1192): pid=4210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.660643 kernel: audit: type=1103 audit(1734055276.652:1193): pid=4210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.652000 audit[4210]: CRED_ACQ pid=4210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.656513 sshd[4210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:16.664128 kernel: audit: type=1006 audit(1734055276.652:1194): pid=4210 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 02:01:16.664197 kernel: audit: type=1300 audit(1734055276.652:1194): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6fdf030 a2=3 a3=0 items=0 ppid=1 pid=4210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.652000 audit[4210]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6fdf030 a2=3 a3=0 items=0 ppid=1 pid=4210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:16.670546 kernel: audit: type=1327 audit(1734055276.652:1194): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:16.652000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:16.671594 systemd[1]: Started session-21.scope. Dec 13 02:01:16.671905 systemd-logind[1206]: New session 21 of user core. Dec 13 02:01:16.676000 audit[4210]: USER_START pid=4210 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.682990 kernel: audit: type=1105 audit(1734055276.676:1195): pid=4210 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.682000 audit[4214]: CRED_ACQ pid=4214 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.687958 kernel: audit: type=1103 audit(1734055276.682:1196): pid=4214 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.781973 sshd[4210]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:16.782000 audit[4210]: USER_END pid=4210 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.784756 systemd[1]: sshd@20-10.0.0.133:22-10.0.0.1:44626.service: Deactivated successfully. Dec 13 02:01:16.785456 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:01:16.786030 systemd-logind[1206]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:01:16.786709 systemd-logind[1206]: Removed session 21. Dec 13 02:01:16.782000 audit[4210]: CRED_DISP pid=4210 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.791090 kernel: audit: type=1106 audit(1734055276.782:1197): pid=4210 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.791145 kernel: audit: type=1104 audit(1734055276.782:1198): pid=4210 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:16.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.133:22-10.0.0.1:44626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:17.197310 kubelet[2076]: E1213 02:01:17.197229 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:17.197476 env[1219]: time="2024-12-13T02:01:17.197442988Z" level=info msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\"" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.234 [INFO][4251] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.234 [INFO][4251] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" iface="eth0" netns="/var/run/netns/cni-01574464-4767-fdca-1857-56e91ec7adf8" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.234 [INFO][4251] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" iface="eth0" netns="/var/run/netns/cni-01574464-4767-fdca-1857-56e91ec7adf8" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.234 [INFO][4251] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" iface="eth0" netns="/var/run/netns/cni-01574464-4767-fdca-1857-56e91ec7adf8" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.234 [INFO][4251] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.234 [INFO][4251] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.255 [INFO][4258] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" HandleID="k8s-pod-network.3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.255 [INFO][4258] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.255 [INFO][4258] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.260 [WARNING][4258] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" HandleID="k8s-pod-network.3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.260 [INFO][4258] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" HandleID="k8s-pod-network.3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.261 [INFO][4258] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:17.264608 env[1219]: 2024-12-13 02:01:17.263 [INFO][4251] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:17.265047 env[1219]: time="2024-12-13T02:01:17.264720425Z" level=info msg="TearDown network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\" successfully" Dec 13 02:01:17.265047 env[1219]: time="2024-12-13T02:01:17.264755772Z" level=info msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\" returns successfully" Dec 13 02:01:17.265401 env[1219]: time="2024-12-13T02:01:17.265367633Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6b995bdd-46kpn,Uid:29d76287-050b-45b1-afc1-918e6f3fd86b,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:01:17.266800 systemd[1]: run-netns-cni\x2d01574464\x2d4767\x2dfdca\x2d1857\x2d56e91ec7adf8.mount: Deactivated successfully. Dec 13 02:01:17.354630 systemd-networkd[1037]: calid87a4eee2b9: Link UP Dec 13 02:01:17.356793 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:01:17.356845 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid87a4eee2b9: link becomes ready Dec 13 02:01:17.356954 systemd-networkd[1037]: calid87a4eee2b9: Gained carrier Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.289 [INFO][4265] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.298 [INFO][4265] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0 calico-apiserver-6f6b995bdd- calico-apiserver 29d76287-050b-45b1-afc1-918e6f3fd86b 1133 0 2024-12-13 02:00:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6f6b995bdd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6f6b995bdd-46kpn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid87a4eee2b9 [] []}} ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-46kpn" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.298 [INFO][4265] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-46kpn" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.321 [INFO][4279] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" HandleID="k8s-pod-network.ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.327 [INFO][4279] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" HandleID="k8s-pod-network.ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000294050), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6f6b995bdd-46kpn", "timestamp":"2024-12-13 02:01:17.32167195 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.327 [INFO][4279] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.328 [INFO][4279] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.328 [INFO][4279] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.329 [INFO][4279] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" host="localhost" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.332 [INFO][4279] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.335 [INFO][4279] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.337 [INFO][4279] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.338 [INFO][4279] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.338 [INFO][4279] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" host="localhost" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.339 [INFO][4279] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83 Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.342 [INFO][4279] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" host="localhost" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.346 [INFO][4279] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" host="localhost" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.346 [INFO][4279] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" host="localhost" Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.346 [INFO][4279] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:17.366645 env[1219]: 2024-12-13 02:01:17.346 [INFO][4279] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" HandleID="k8s-pod-network.ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.367196 env[1219]: 2024-12-13 02:01:17.348 [INFO][4265] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-46kpn" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0", GenerateName:"calico-apiserver-6f6b995bdd-", Namespace:"calico-apiserver", SelfLink:"", UID:"29d76287-050b-45b1-afc1-918e6f3fd86b", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6b995bdd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6f6b995bdd-46kpn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid87a4eee2b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:17.367196 env[1219]: 2024-12-13 02:01:17.348 [INFO][4265] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-46kpn" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.367196 env[1219]: 2024-12-13 02:01:17.348 [INFO][4265] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid87a4eee2b9 ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-46kpn" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.367196 env[1219]: 2024-12-13 02:01:17.356 [INFO][4265] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-46kpn" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.367196 env[1219]: 2024-12-13 02:01:17.357 [INFO][4265] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-46kpn" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0", GenerateName:"calico-apiserver-6f6b995bdd-", Namespace:"calico-apiserver", SelfLink:"", UID:"29d76287-050b-45b1-afc1-918e6f3fd86b", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6b995bdd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83", Pod:"calico-apiserver-6f6b995bdd-46kpn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid87a4eee2b9", MAC:"4a:65:0d:54:e2:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:17.367196 env[1219]: 2024-12-13 02:01:17.365 [INFO][4265] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-46kpn" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:17.377020 env[1219]: time="2024-12-13T02:01:17.376910114Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:17.377020 env[1219]: time="2024-12-13T02:01:17.376998552Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:17.377020 env[1219]: time="2024-12-13T02:01:17.377010966Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:17.377304 env[1219]: time="2024-12-13T02:01:17.377243838Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83 pid=4310 runtime=io.containerd.runc.v2 Dec 13 02:01:17.386327 systemd[1]: Started cri-containerd-ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83.scope. Dec 13 02:01:17.394965 kubelet[2076]: E1213 02:01:17.393163 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.399000 audit: BPF prog-id=155 op=LOAD Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4310 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363934396466396461656233653933346634396534656132323439 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4310 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363934396466396461656233653933346634396534656132323439 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit: BPF prog-id=156 op=LOAD Dec 13 02:01:17.400000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f9d90 items=0 ppid=4310 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363934396466396461656233653933346634396534656132323439 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit: BPF prog-id=157 op=LOAD Dec 13 02:01:17.400000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f9dd8 items=0 ppid=4310 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363934396466396461656233653933346634396534656132323439 Dec 13 02:01:17.400000 audit: BPF prog-id=157 op=UNLOAD Dec 13 02:01:17.400000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.400000 audit: BPF prog-id=158 op=LOAD Dec 13 02:01:17.400000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ec1e8 items=0 ppid=4310 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363934396466396461656233653933346634396534656132323439 Dec 13 02:01:17.402104 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:17.435089 env[1219]: time="2024-12-13T02:01:17.435050866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6b995bdd-46kpn,Uid:29d76287-050b-45b1-afc1-918e6f3fd86b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83\"" Dec 13 02:01:17.441277 env[1219]: time="2024-12-13T02:01:17.440714361Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:01:17.711000 audit[4405]: AVC avc: denied { write } for pid=4405 comm="tee" name="fd" dev="proc" ino=28136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.711000 audit[4405]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1857aa2b a2=241 a3=1b6 items=1 ppid=4375 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.711000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:01:17.711000 audit: PATH item=0 name="/dev/fd/63" inode=26614 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.711000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.714000 audit[4421]: AVC avc: denied { write } for pid=4421 comm="tee" name="fd" dev="proc" ino=26619 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.714000 audit[4421]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4a24aa1a a2=241 a3=1b6 items=1 ppid=4387 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.714000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:01:17.714000 audit: PATH item=0 name="/dev/fd/63" inode=29069 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.714000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.719000 audit[4427]: AVC avc: denied { write } for pid=4427 comm="tee" name="fd" dev="proc" ino=28146 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.719000 audit[4427]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd82888a2c a2=241 a3=1b6 items=1 ppid=4374 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.719000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:01:17.719000 audit: PATH item=0 name="/dev/fd/63" inode=26621 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.719000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.720000 audit[4431]: AVC avc: denied { write } for pid=4431 comm="tee" name="fd" dev="proc" ino=29074 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.720000 audit[4431]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdde333a1b a2=241 a3=1b6 items=1 ppid=4379 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.720000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:01:17.720000 audit: PATH item=0 name="/dev/fd/63" inode=26624 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.720000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.724000 audit[4436]: AVC avc: denied { write } for pid=4436 comm="tee" name="fd" dev="proc" ino=27223 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.724000 audit[4436]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7a6cba2a a2=241 a3=1b6 items=1 ppid=4384 pid=4436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.724000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:01:17.724000 audit: PATH item=0 name="/dev/fd/63" inode=29699 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.724000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.728000 audit[4449]: AVC avc: denied { write } for pid=4449 comm="tee" name="fd" dev="proc" ino=27227 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.728000 audit[4449]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd8a44a2a a2=241 a3=1b6 items=1 ppid=4378 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.728000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:01:17.728000 audit: PATH item=0 name="/dev/fd/63" inode=27220 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.728000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.777000 audit[4456]: AVC avc: denied { write } for pid=4456 comm="tee" name="fd" dev="proc" ino=29099 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:01:17.777000 audit[4456]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff413b8a2a a2=241 a3=1b6 items=1 ppid=4389 pid=4456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.777000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:01:17.777000 audit: PATH item=0 name="/dev/fd/63" inode=29076 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:01:17.777000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:01:17.823000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.823000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.823000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.823000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.823000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.823000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.823000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.823000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.823000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.823000 audit: BPF prog-id=159 op=LOAD Dec 13 02:01:17.823000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe2b96c30 a2=98 a3=3 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.823000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit: BPF prog-id=160 op=LOAD Dec 13 02:01:17.824000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe2b96a10 a2=74 a3=540051 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.824000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.824000 audit: BPF prog-id=161 op=LOAD Dec 13 02:01:17.824000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe2b96a40 a2=94 a3=2 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.824000 audit: BPF prog-id=161 op=UNLOAD Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit: BPF prog-id=162 op=LOAD Dec 13 02:01:17.928000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe2b96900 a2=40 a3=1 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.928000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.928000 audit: BPF prog-id=162 op=UNLOAD Dec 13 02:01:17.928000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.928000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffe2b969d0 a2=50 a3=7fffe2b96ab0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.928000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe2b96910 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2b96940 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2b96850 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe2b96960 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe2b96940 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe2b96930 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe2b96960 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2b96940 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2b96960 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2b96930 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.935000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.935000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe2b969a0 a2=28 a3=0 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffe2b96750 a2=50 a3=1 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.936000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit: BPF prog-id=163 op=LOAD Dec 13 02:01:17.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe2b96750 a2=94 a3=5 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.936000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.936000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffe2b96800 a2=50 a3=1 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.936000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffe2b96920 a2=4 a3=38 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.936000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { confidentiality } for pid=4489 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:17.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe2b96970 a2=94 a3=6 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.936000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { confidentiality } for pid=4489 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:17.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe2b96120 a2=94 a3=83 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.936000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.936000 audit[4489]: AVC avc: denied { confidentiality } for pid=4489 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:17.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe2b96120 a2=94 a3=83 items=0 ppid=4386 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.936000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:01:17.942000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.942000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.942000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.942000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.942000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.942000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.942000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.942000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.942000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.942000 audit: BPF prog-id=164 op=LOAD Dec 13 02:01:17.942000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2a9316c0 a2=98 a3=1999999999999999 items=0 ppid=4386 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.942000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:01:17.943000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit: BPF prog-id=165 op=LOAD Dec 13 02:01:17.943000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2a9315a0 a2=74 a3=ffff items=0 ppid=4386 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.943000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:01:17.943000 audit: BPF prog-id=165 op=UNLOAD Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.943000 audit: BPF prog-id=166 op=LOAD Dec 13 02:01:17.943000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2a9315e0 a2=40 a3=7ffe2a9317c0 items=0 ppid=4386 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.943000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:01:17.943000 audit: BPF prog-id=166 op=UNLOAD Dec 13 02:01:17.985504 systemd-networkd[1037]: vxlan.calico: Link UP Dec 13 02:01:17.985510 systemd-networkd[1037]: vxlan.calico: Gained carrier Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit: BPF prog-id=167 op=LOAD Dec 13 02:01:17.986000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbb2476f0 a2=98 a3=ffffffff items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.986000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit: BPF prog-id=168 op=LOAD Dec 13 02:01:17.986000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbb247500 a2=74 a3=540051 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.986000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit: BPF prog-id=169 op=LOAD Dec 13 02:01:17.986000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbb247530 a2=94 a3=2 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.986000 audit: BPF prog-id=169 op=UNLOAD Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbb247400 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbb247430 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbb247340 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbb247450 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbb247430 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.986000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.986000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbb247420 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbb247450 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbb247430 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbb247450 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbb247420 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbb247490 a2=28 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit: BPF prog-id=170 op=LOAD Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbb247300 a2=40 a3=0 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit: BPF prog-id=170 op=UNLOAD Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffbb2472f0 a2=50 a3=2800 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffbb2472f0 a2=50 a3=2800 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit: BPF prog-id=171 op=LOAD Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbb246b10 a2=94 a3=2 items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.989000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.989000 audit: BPF prog-id=172 op=LOAD Dec 13 02:01:17.989000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbb246c10 a2=94 a3=2d items=0 ppid=4386 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit: BPF prog-id=173 op=LOAD Dec 13 02:01:17.992000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1a5706c0 a2=98 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.992000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:17.992000 audit: BPF prog-id=173 op=UNLOAD Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit: BPF prog-id=174 op=LOAD Dec 13 02:01:17.992000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1a5704a0 a2=74 a3=540051 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.992000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:17.992000 audit: BPF prog-id=174 op=UNLOAD Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:17.992000 audit: BPF prog-id=175 op=LOAD Dec 13 02:01:17.992000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1a5704d0 a2=94 a3=2 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:17.992000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:17.993000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit: BPF prog-id=176 op=LOAD Dec 13 02:01:18.098000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1a570390 a2=40 a3=1 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.098000 audit: BPF prog-id=176 op=UNLOAD Dec 13 02:01:18.098000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.098000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe1a570460 a2=50 a3=7ffe1a570540 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1a5703a0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1a5703d0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1a5702e0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1a5703f0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1a5703d0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1a5703c0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1a5703f0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1a5703d0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1a5703f0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1a5703c0 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.105000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.105000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1a570430 a2=28 a3=0 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1a5701e0 a2=50 a3=1 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit: BPF prog-id=177 op=LOAD Dec 13 02:01:18.106000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1a5701e0 a2=94 a3=5 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.106000 audit: BPF prog-id=177 op=UNLOAD Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1a570290 a2=50 a3=1 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe1a5703b0 a2=4 a3=38 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { confidentiality } for pid=4529 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:18.106000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1a570400 a2=94 a3=6 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { confidentiality } for pid=4529 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:18.106000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1a56fbb0 a2=94 a3=83 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { confidentiality } for pid=4529 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:01:18.106000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1a56fbb0 a2=94 a3=83 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.106000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.106000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1a5715f0 a2=10 a3=208 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.107000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.107000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1a571490 a2=10 a3=3 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.107000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.107000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1a571430 a2=10 a3=3 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.107000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:18.107000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1a571430 a2=10 a3=7 items=0 ppid=4386 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:01:18.114000 audit: BPF prog-id=172 op=UNLOAD Dec 13 02:01:18.156000 audit[4552]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:18.156000 audit[4552]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc8bed82e0 a2=0 a3=7ffc8bed82cc items=0 ppid=4386 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.156000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:18.157000 audit[4553]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4553 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:18.157000 audit[4553]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffee1986760 a2=0 a3=7ffee198674c items=0 ppid=4386 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.157000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:18.164000 audit[4558]: NETFILTER_CFG table=filter:99 family=2 entries=75 op=nft_register_chain pid=4558 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:18.164000 audit[4558]: SYSCALL arch=c000003e syscall=46 success=yes exit=40748 a0=3 a1=7ffd14158610 a2=0 a3=7ffd141585fc items=0 ppid=4386 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.164000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:18.166000 audit[4551]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4551 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:18.166000 audit[4551]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc39f48280 a2=0 a3=7ffc39f4826c items=0 ppid=4386 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:18.166000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:18.395283 kubelet[2076]: E1213 02:01:18.395261 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:18.853083 systemd-networkd[1037]: calid87a4eee2b9: Gained IPv6LL Dec 13 02:01:20.005103 systemd-networkd[1037]: vxlan.calico: Gained IPv6LL Dec 13 02:01:20.490971 env[1219]: time="2024-12-13T02:01:20.490907562Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:20.492534 env[1219]: time="2024-12-13T02:01:20.492485844Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:20.494037 env[1219]: time="2024-12-13T02:01:20.493997851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:20.495269 env[1219]: time="2024-12-13T02:01:20.495239595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:20.495730 env[1219]: time="2024-12-13T02:01:20.495702874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:01:20.497573 env[1219]: time="2024-12-13T02:01:20.497545407Z" level=info msg="CreateContainer within sandbox \"ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:01:20.508670 env[1219]: time="2024-12-13T02:01:20.508621838Z" level=info msg="CreateContainer within sandbox \"ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5d7f7dda904e65eb2c59dca4f3f733a586e163abcab4a92d2bd07a5f5500bc49\"" Dec 13 02:01:20.509105 env[1219]: time="2024-12-13T02:01:20.509078744Z" level=info msg="StartContainer for \"5d7f7dda904e65eb2c59dca4f3f733a586e163abcab4a92d2bd07a5f5500bc49\"" Dec 13 02:01:20.526112 systemd[1]: run-containerd-runc-k8s.io-5d7f7dda904e65eb2c59dca4f3f733a586e163abcab4a92d2bd07a5f5500bc49-runc.zaL4C9.mount: Deactivated successfully. Dec 13 02:01:20.527506 systemd[1]: Started cri-containerd-5d7f7dda904e65eb2c59dca4f3f733a586e163abcab4a92d2bd07a5f5500bc49.scope. Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit: BPF prog-id=178 op=LOAD Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4310 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:20.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376637646461393034653635656232633539646361346633663733 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4310 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:20.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376637646461393034653635656232633539646361346633663733 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.535000 audit: BPF prog-id=179 op=LOAD Dec 13 02:01:20.535000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000404230 items=0 ppid=4310 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:20.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376637646461393034653635656232633539646361346633663733 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit: BPF prog-id=180 op=LOAD Dec 13 02:01:20.536000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000404278 items=0 ppid=4310 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:20.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376637646461393034653635656232633539646361346633663733 Dec 13 02:01:20.536000 audit: BPF prog-id=180 op=UNLOAD Dec 13 02:01:20.536000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:20.536000 audit: BPF prog-id=181 op=LOAD Dec 13 02:01:20.536000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000404688 items=0 ppid=4310 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:20.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564376637646461393034653635656232633539646361346633663733 Dec 13 02:01:20.559352 env[1219]: time="2024-12-13T02:01:20.559316715Z" level=info msg="StartContainer for \"5d7f7dda904e65eb2c59dca4f3f733a586e163abcab4a92d2bd07a5f5500bc49\" returns successfully" Dec 13 02:01:21.117000 audit[4606]: AVC avc: denied { watch } for pid=4606 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_00_33.2348450142/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c41,c464 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c41,c464 tclass=file permissive=0 Dec 13 02:01:21.117000 audit[4606]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c46400 a2=fc6 a3=0 items=0 ppid=4310 pid=4606 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c41,c464 key=(null) Dec 13 02:01:21.117000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:01:21.410368 kubelet[2076]: I1213 02:01:21.409851 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-mxv4f" podStartSLOduration=7.409836217 podStartE2EDuration="7.409836217s" podCreationTimestamp="2024-12-13 02:01:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:01:17.408518645 +0000 UTC m=+89.285568314" watchObservedRunningTime="2024-12-13 02:01:21.409836217 +0000 UTC m=+93.286885886" Dec 13 02:01:21.410368 kubelet[2076]: I1213 02:01:21.410141 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6f6b995bdd-46kpn" podStartSLOduration=64.354079739 podStartE2EDuration="1m7.410136406s" podCreationTimestamp="2024-12-13 02:00:14 +0000 UTC" firstStartedPulling="2024-12-13 02:01:17.440331926 +0000 UTC m=+89.317381595" lastFinishedPulling="2024-12-13 02:01:20.496388593 +0000 UTC m=+92.373438262" observedRunningTime="2024-12-13 02:01:21.409628674 +0000 UTC m=+93.286678343" watchObservedRunningTime="2024-12-13 02:01:21.410136406 +0000 UTC m=+93.287186076" Dec 13 02:01:21.431000 audit[4628]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=4628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.431000 audit[4628]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdbda12140 a2=0 a3=7ffdbda1212c items=0 ppid=2224 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.437000 audit[4628]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.437000 audit[4628]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdbda12140 a2=0 a3=0 items=0 ppid=2224 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.448000 audit[4630]: NETFILTER_CFG table=filter:103 family=2 entries=15 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.448000 audit[4630]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc990f6bc0 a2=0 a3=7ffc990f6bac items=0 ppid=2224 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.454000 audit[4630]: NETFILTER_CFG table=nat:104 family=2 entries=21 op=nft_register_chain pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:21.454000 audit[4630]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffc990f6bc0 a2=0 a3=7ffc990f6bac items=0 ppid=2224 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:21.786641 systemd[1]: Started sshd@21-10.0.0.133:22-10.0.0.1:44632.service. Dec 13 02:01:21.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.133:22-10.0.0.1:44632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:21.788145 kernel: kauditd_printk_skb: 645 callbacks suppressed Dec 13 02:01:21.788211 kernel: audit: type=1130 audit(1734055281.785:1343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.133:22-10.0.0.1:44632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:21.821000 audit[4632]: USER_ACCT pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.822386 sshd[4632]: Accepted publickey for core from 10.0.0.1 port 44632 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:21.825971 sshd[4632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:21.823000 audit[4632]: CRED_ACQ pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.830191 systemd[1]: Started session-22.scope. Dec 13 02:01:21.830785 kernel: audit: type=1101 audit(1734055281.821:1344): pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.830823 kernel: audit: type=1103 audit(1734055281.823:1345): pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.830847 kernel: audit: type=1006 audit(1734055281.823:1346): pid=4632 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 02:01:21.830513 systemd-logind[1206]: New session 22 of user core. Dec 13 02:01:21.833088 kernel: audit: type=1300 audit(1734055281.823:1346): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1bfea200 a2=3 a3=0 items=0 ppid=1 pid=4632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.823000 audit[4632]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1bfea200 a2=3 a3=0 items=0 ppid=1 pid=4632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:21.823000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:21.838359 kernel: audit: type=1327 audit(1734055281.823:1346): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:21.838404 kernel: audit: type=1105 audit(1734055281.834:1347): pid=4632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.834000 audit[4632]: USER_START pid=4632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.835000 audit[4634]: CRED_ACQ pid=4634 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.846048 kernel: audit: type=1103 audit(1734055281.835:1348): pid=4634 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.934063 sshd[4632]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:21.934000 audit[4632]: USER_END pid=4632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.936620 systemd[1]: sshd@21-10.0.0.133:22-10.0.0.1:44632.service: Deactivated successfully. Dec 13 02:01:21.937319 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:01:21.938037 systemd-logind[1206]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:01:21.938721 systemd-logind[1206]: Removed session 22. Dec 13 02:01:21.934000 audit[4632]: CRED_DISP pid=4632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.942924 kernel: audit: type=1106 audit(1734055281.934:1349): pid=4632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.942984 kernel: audit: type=1104 audit(1734055281.934:1350): pid=4632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:21.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.133:22-10.0.0.1:44632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:26.197014 env[1219]: time="2024-12-13T02:01:26.196967145Z" level=info msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\"" Dec 13 02:01:26.197311 env[1219]: time="2024-12-13T02:01:26.197071202Z" level=info msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\"" Dec 13 02:01:26.198359 env[1219]: time="2024-12-13T02:01:26.196985120Z" level=info msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\"" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.250 [INFO][4705] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.251 [INFO][4705] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" iface="eth0" netns="/var/run/netns/cni-b2943360-c777-9e47-5a9d-fe06ad1e4b78" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.251 [INFO][4705] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" iface="eth0" netns="/var/run/netns/cni-b2943360-c777-9e47-5a9d-fe06ad1e4b78" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.252 [INFO][4705] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" iface="eth0" netns="/var/run/netns/cni-b2943360-c777-9e47-5a9d-fe06ad1e4b78" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.252 [INFO][4705] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.252 [INFO][4705] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.276 [INFO][4728] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" HandleID="k8s-pod-network.afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.276 [INFO][4728] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.276 [INFO][4728] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.281 [WARNING][4728] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" HandleID="k8s-pod-network.afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.281 [INFO][4728] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" HandleID="k8s-pod-network.afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.282 [INFO][4728] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:26.286547 env[1219]: 2024-12-13 02:01:26.284 [INFO][4705] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:26.288630 env[1219]: time="2024-12-13T02:01:26.286700201Z" level=info msg="TearDown network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" successfully" Dec 13 02:01:26.288630 env[1219]: time="2024-12-13T02:01:26.286730368Z" level=info msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" returns successfully" Dec 13 02:01:26.288630 env[1219]: time="2024-12-13T02:01:26.287383735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6b995bdd-4fxb8,Uid:84cc8599-b8a8-43d2-8b5c-5a022da5fb55,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:01:26.288977 systemd[1]: run-netns-cni\x2db2943360\x2dc777\x2d9e47\x2d5a9d\x2dfe06ad1e4b78.mount: Deactivated successfully. Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.253 [INFO][4706] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.253 [INFO][4706] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" iface="eth0" netns="/var/run/netns/cni-135a13c4-9c46-f0ef-af7a-024f53071545" Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.253 [INFO][4706] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" iface="eth0" netns="/var/run/netns/cni-135a13c4-9c46-f0ef-af7a-024f53071545" Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.253 [INFO][4706] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" iface="eth0" netns="/var/run/netns/cni-135a13c4-9c46-f0ef-af7a-024f53071545" Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.253 [INFO][4706] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.253 [INFO][4706] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.276 [INFO][4730] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" HandleID="k8s-pod-network.e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.276 [INFO][4730] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.282 [INFO][4730] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.290 [WARNING][4730] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" HandleID="k8s-pod-network.e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.290 [INFO][4730] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" HandleID="k8s-pod-network.e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.291 [INFO][4730] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:26.294026 env[1219]: 2024-12-13 02:01:26.292 [INFO][4706] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:26.294612 env[1219]: time="2024-12-13T02:01:26.294586425Z" level=info msg="TearDown network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" successfully" Dec 13 02:01:26.294705 env[1219]: time="2024-12-13T02:01:26.294680934Z" level=info msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" returns successfully" Dec 13 02:01:26.296344 systemd[1]: run-netns-cni\x2d135a13c4\x2d9c46\x2df0ef\x2daf7a\x2d024f53071545.mount: Deactivated successfully. Dec 13 02:01:26.296513 env[1219]: time="2024-12-13T02:01:26.296465423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bd74ff756-ts7cv,Uid:1184bdee-ddbd-4572-9358-2e64b0d4fb76,Namespace:calico-system,Attempt:1,}" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.248 [INFO][4703] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.250 [INFO][4703] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" iface="eth0" netns="/var/run/netns/cni-ae87bc30-d7b9-e5c1-c56b-daa533b819c6" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.250 [INFO][4703] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" iface="eth0" netns="/var/run/netns/cni-ae87bc30-d7b9-e5c1-c56b-daa533b819c6" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.252 [INFO][4703] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" iface="eth0" netns="/var/run/netns/cni-ae87bc30-d7b9-e5c1-c56b-daa533b819c6" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.252 [INFO][4703] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.252 [INFO][4703] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.276 [INFO][4729] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" HandleID="k8s-pod-network.da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.277 [INFO][4729] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.291 [INFO][4729] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.297 [WARNING][4729] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" HandleID="k8s-pod-network.da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.297 [INFO][4729] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" HandleID="k8s-pod-network.da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.299 [INFO][4729] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:26.301577 env[1219]: 2024-12-13 02:01:26.300 [INFO][4703] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:26.321117 env[1219]: time="2024-12-13T02:01:26.301699314Z" level=info msg="TearDown network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" successfully" Dec 13 02:01:26.321117 env[1219]: time="2024-12-13T02:01:26.301729362Z" level=info msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" returns successfully" Dec 13 02:01:26.321117 env[1219]: time="2024-12-13T02:01:26.302217395Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v75ck,Uid:2bd5041f-f9cd-42cf-a423-3f4b7c4eecee,Namespace:calico-system,Attempt:1,}" Dec 13 02:01:26.303378 systemd[1]: run-netns-cni\x2dae87bc30\x2dd7b9\x2de5c1\x2dc56b\x2ddaa533b819c6.mount: Deactivated successfully. Dec 13 02:01:26.451443 systemd-networkd[1037]: calicd20b7d68e7: Link UP Dec 13 02:01:26.453618 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:01:26.453668 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicd20b7d68e7: link becomes ready Dec 13 02:01:26.453763 systemd-networkd[1037]: calicd20b7d68e7: Gained carrier Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.382 [INFO][4752] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--v75ck-eth0 csi-node-driver- calico-system 2bd5041f-f9cd-42cf-a423-3f4b7c4eecee 1189 0 2024-12-13 02:00:14 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-v75ck eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calicd20b7d68e7 [] []}} ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Namespace="calico-system" Pod="csi-node-driver-v75ck" WorkloadEndpoint="localhost-k8s-csi--node--driver--v75ck-" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.383 [INFO][4752] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Namespace="calico-system" Pod="csi-node-driver-v75ck" WorkloadEndpoint="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.416 [INFO][4795] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" HandleID="k8s-pod-network.2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.423 [INFO][4795] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" HandleID="k8s-pod-network.2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000375f50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-v75ck", "timestamp":"2024-12-13 02:01:26.416239235 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.423 [INFO][4795] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.423 [INFO][4795] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.423 [INFO][4795] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.424 [INFO][4795] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" host="localhost" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.429 [INFO][4795] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.432 [INFO][4795] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.433 [INFO][4795] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.434 [INFO][4795] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.435 [INFO][4795] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" host="localhost" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.435 [INFO][4795] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5 Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.440 [INFO][4795] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" host="localhost" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.446 [INFO][4795] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" host="localhost" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.446 [INFO][4795] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" host="localhost" Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.447 [INFO][4795] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:26.470360 env[1219]: 2024-12-13 02:01:26.447 [INFO][4795] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" HandleID="k8s-pod-network.2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.471161 env[1219]: 2024-12-13 02:01:26.448 [INFO][4752] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Namespace="calico-system" Pod="csi-node-driver-v75ck" WorkloadEndpoint="localhost-k8s-csi--node--driver--v75ck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--v75ck-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee", ResourceVersion:"1189", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-v75ck", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicd20b7d68e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:26.471161 env[1219]: 2024-12-13 02:01:26.448 [INFO][4752] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Namespace="calico-system" Pod="csi-node-driver-v75ck" WorkloadEndpoint="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.471161 env[1219]: 2024-12-13 02:01:26.448 [INFO][4752] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicd20b7d68e7 ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Namespace="calico-system" Pod="csi-node-driver-v75ck" WorkloadEndpoint="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.471161 env[1219]: 2024-12-13 02:01:26.453 [INFO][4752] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Namespace="calico-system" Pod="csi-node-driver-v75ck" WorkloadEndpoint="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.471161 env[1219]: 2024-12-13 02:01:26.454 [INFO][4752] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Namespace="calico-system" Pod="csi-node-driver-v75ck" WorkloadEndpoint="localhost-k8s-csi--node--driver--v75ck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--v75ck-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee", ResourceVersion:"1189", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5", Pod:"csi-node-driver-v75ck", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicd20b7d68e7", MAC:"0e:87:88:0e:65:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:26.471161 env[1219]: 2024-12-13 02:01:26.464 [INFO][4752] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5" Namespace="calico-system" Pod="csi-node-driver-v75ck" WorkloadEndpoint="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:26.473000 audit[4831]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=4831 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:26.473000 audit[4831]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffdd79e0330 a2=0 a3=7ffdd79e031c items=0 ppid=4386 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.473000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:26.483863 systemd-networkd[1037]: cali20a9ddb9fea: Link UP Dec 13 02:01:26.484577 env[1219]: time="2024-12-13T02:01:26.484522843Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:26.484715 env[1219]: time="2024-12-13T02:01:26.484557828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:26.484715 env[1219]: time="2024-12-13T02:01:26.484579059Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:26.484715 env[1219]: time="2024-12-13T02:01:26.484681814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5 pid=4844 runtime=io.containerd.runc.v2 Dec 13 02:01:26.485912 systemd-networkd[1037]: cali20a9ddb9fea: Gained carrier Dec 13 02:01:26.486008 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali20a9ddb9fea: link becomes ready Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.382 [INFO][4765] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0 calico-kube-controllers-5bd74ff756- calico-system 1184bdee-ddbd-4572-9358-2e64b0d4fb76 1191 0 2024-12-13 02:00:14 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5bd74ff756 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5bd74ff756-ts7cv eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali20a9ddb9fea [] []}} ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Namespace="calico-system" Pod="calico-kube-controllers-5bd74ff756-ts7cv" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.383 [INFO][4765] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Namespace="calico-system" Pod="calico-kube-controllers-5bd74ff756-ts7cv" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.414 [INFO][4796] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" HandleID="k8s-pod-network.79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.423 [INFO][4796] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" HandleID="k8s-pod-network.79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005a2ed0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5bd74ff756-ts7cv", "timestamp":"2024-12-13 02:01:26.414262412 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.423 [INFO][4796] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.447 [INFO][4796] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.447 [INFO][4796] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.448 [INFO][4796] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" host="localhost" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.451 [INFO][4796] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.456 [INFO][4796] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.458 [INFO][4796] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.459 [INFO][4796] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.459 [INFO][4796] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" host="localhost" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.462 [INFO][4796] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6 Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.466 [INFO][4796] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" host="localhost" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.479 [INFO][4796] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" host="localhost" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.479 [INFO][4796] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" host="localhost" Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.479 [INFO][4796] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:26.501900 env[1219]: 2024-12-13 02:01:26.479 [INFO][4796] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" HandleID="k8s-pod-network.79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.502553 env[1219]: 2024-12-13 02:01:26.481 [INFO][4765] cni-plugin/k8s.go 386: Populated endpoint ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Namespace="calico-system" Pod="calico-kube-controllers-5bd74ff756-ts7cv" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0", GenerateName:"calico-kube-controllers-5bd74ff756-", Namespace:"calico-system", SelfLink:"", UID:"1184bdee-ddbd-4572-9358-2e64b0d4fb76", ResourceVersion:"1191", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bd74ff756", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5bd74ff756-ts7cv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali20a9ddb9fea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:26.502553 env[1219]: 2024-12-13 02:01:26.481 [INFO][4765] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Namespace="calico-system" Pod="calico-kube-controllers-5bd74ff756-ts7cv" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.502553 env[1219]: 2024-12-13 02:01:26.481 [INFO][4765] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali20a9ddb9fea ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Namespace="calico-system" Pod="calico-kube-controllers-5bd74ff756-ts7cv" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.502553 env[1219]: 2024-12-13 02:01:26.486 [INFO][4765] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Namespace="calico-system" Pod="calico-kube-controllers-5bd74ff756-ts7cv" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.502553 env[1219]: 2024-12-13 02:01:26.486 [INFO][4765] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Namespace="calico-system" Pod="calico-kube-controllers-5bd74ff756-ts7cv" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0", GenerateName:"calico-kube-controllers-5bd74ff756-", Namespace:"calico-system", SelfLink:"", UID:"1184bdee-ddbd-4572-9358-2e64b0d4fb76", ResourceVersion:"1191", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bd74ff756", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6", Pod:"calico-kube-controllers-5bd74ff756-ts7cv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali20a9ddb9fea", MAC:"0e:c5:2f:b1:a6:1d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:26.502553 env[1219]: 2024-12-13 02:01:26.497 [INFO][4765] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6" Namespace="calico-system" Pod="calico-kube-controllers-5bd74ff756-ts7cv" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:26.502276 systemd[1]: Started cri-containerd-2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5.scope. Dec 13 02:01:26.505000 audit[4868]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=4868 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:26.505000 audit[4868]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffc8d5bf230 a2=0 a3=7ffc8d5bf21c items=0 ppid=4386 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.505000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:26.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit: BPF prog-id=182 op=LOAD Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4844 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265303164636363313339336362346534316631633033636561616264 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4844 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265303164636363313339336362346534316631633033636561616264 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit: BPF prog-id=183 op=LOAD Dec 13 02:01:26.514000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a0f70 items=0 ppid=4844 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265303164636363313339336362346534316631633033636561616264 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit: BPF prog-id=184 op=LOAD Dec 13 02:01:26.514000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a0fb8 items=0 ppid=4844 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265303164636363313339336362346534316631633033636561616264 Dec 13 02:01:26.514000 audit: BPF prog-id=184 op=UNLOAD Dec 13 02:01:26.514000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.514000 audit: BPF prog-id=185 op=LOAD Dec 13 02:01:26.514000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a13c8 items=0 ppid=4844 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265303164636363313339336362346534316631633033636561616264 Dec 13 02:01:26.516354 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:26.523424 systemd-networkd[1037]: cali4d70402492b: Link UP Dec 13 02:01:26.525477 systemd-networkd[1037]: cali4d70402492b: Gained carrier Dec 13 02:01:26.525965 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4d70402492b: link becomes ready Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.400 [INFO][4758] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0 calico-apiserver-6f6b995bdd- calico-apiserver 84cc8599-b8a8-43d2-8b5c-5a022da5fb55 1190 0 2024-12-13 02:00:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6f6b995bdd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6f6b995bdd-4fxb8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4d70402492b [] []}} ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-4fxb8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.400 [INFO][4758] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-4fxb8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.425 [INFO][4810] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" HandleID="k8s-pod-network.22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.432 [INFO][4810] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" HandleID="k8s-pod-network.22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000133de0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6f6b995bdd-4fxb8", "timestamp":"2024-12-13 02:01:26.42577296 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.432 [INFO][4810] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.487 [INFO][4810] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.487 [INFO][4810] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.490 [INFO][4810] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" host="localhost" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.497 [INFO][4810] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.503 [INFO][4810] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.505 [INFO][4810] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.507 [INFO][4810] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.507 [INFO][4810] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" host="localhost" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.508 [INFO][4810] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202 Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.511 [INFO][4810] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" host="localhost" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.519 [INFO][4810] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" host="localhost" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.519 [INFO][4810] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" host="localhost" Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.519 [INFO][4810] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:26.534781 env[1219]: 2024-12-13 02:01:26.519 [INFO][4810] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" HandleID="k8s-pod-network.22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.535475 env[1219]: 2024-12-13 02:01:26.521 [INFO][4758] cni-plugin/k8s.go 386: Populated endpoint ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-4fxb8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0", GenerateName:"calico-apiserver-6f6b995bdd-", Namespace:"calico-apiserver", SelfLink:"", UID:"84cc8599-b8a8-43d2-8b5c-5a022da5fb55", ResourceVersion:"1190", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6b995bdd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6f6b995bdd-4fxb8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4d70402492b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:26.535475 env[1219]: 2024-12-13 02:01:26.521 [INFO][4758] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-4fxb8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.535475 env[1219]: 2024-12-13 02:01:26.521 [INFO][4758] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4d70402492b ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-4fxb8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.535475 env[1219]: 2024-12-13 02:01:26.526 [INFO][4758] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-4fxb8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.535475 env[1219]: 2024-12-13 02:01:26.526 [INFO][4758] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-4fxb8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0", GenerateName:"calico-apiserver-6f6b995bdd-", Namespace:"calico-apiserver", SelfLink:"", UID:"84cc8599-b8a8-43d2-8b5c-5a022da5fb55", ResourceVersion:"1190", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6b995bdd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202", Pod:"calico-apiserver-6f6b995bdd-4fxb8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4d70402492b", MAC:"62:95:35:94:41:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:26.535475 env[1219]: 2024-12-13 02:01:26.532 [INFO][4758] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202" Namespace="calico-apiserver" Pod="calico-apiserver-6f6b995bdd-4fxb8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:26.536290 env[1219]: time="2024-12-13T02:01:26.535455933Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:26.536369 env[1219]: time="2024-12-13T02:01:26.535495889Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:26.536369 env[1219]: time="2024-12-13T02:01:26.535505627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:26.536369 env[1219]: time="2024-12-13T02:01:26.535602541Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6 pid=4893 runtime=io.containerd.runc.v2 Dec 13 02:01:26.547007 env[1219]: time="2024-12-13T02:01:26.546971681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v75ck,Uid:2bd5041f-f9cd-42cf-a423-3f4b7c4eecee,Namespace:calico-system,Attempt:1,} returns sandbox id \"2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5\"" Dec 13 02:01:26.549209 env[1219]: time="2024-12-13T02:01:26.549171145Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:01:26.550000 audit[4939]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=4939 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:26.550000 audit[4939]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffe6b357a80 a2=0 a3=7ffe6b357a6c items=0 ppid=4386 pid=4939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.550000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:26.551753 systemd[1]: Started cri-containerd-79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6.scope. Dec 13 02:01:26.555400 env[1219]: time="2024-12-13T02:01:26.555330720Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:26.555400 env[1219]: time="2024-12-13T02:01:26.555365064Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:26.555400 env[1219]: time="2024-12-13T02:01:26.555374493Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:26.555499 env[1219]: time="2024-12-13T02:01:26.555470734Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202 pid=4943 runtime=io.containerd.runc.v2 Dec 13 02:01:26.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit: BPF prog-id=186 op=LOAD Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4893 pid=4917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363832623737333739623530346265323765666265303237623263 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4893 pid=4917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363832623737333739623530346265323765666265303237623263 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit: BPF prog-id=187 op=LOAD Dec 13 02:01:26.562000 audit[4917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000252f0 items=0 ppid=4893 pid=4917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363832623737333739623530346265323765666265303237623263 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit: BPF prog-id=188 op=LOAD Dec 13 02:01:26.562000 audit[4917]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025338 items=0 ppid=4893 pid=4917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363832623737333739623530346265323765666265303237623263 Dec 13 02:01:26.562000 audit: BPF prog-id=188 op=UNLOAD Dec 13 02:01:26.562000 audit: BPF prog-id=187 op=UNLOAD Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.562000 audit: BPF prog-id=189 op=LOAD Dec 13 02:01:26.562000 audit[4917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025748 items=0 ppid=4893 pid=4917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363832623737333739623530346265323765666265303237623263 Dec 13 02:01:26.565852 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:26.567256 systemd[1]: Started cri-containerd-22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202.scope. Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit: BPF prog-id=190 op=LOAD Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4943 pid=4960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232636664323636376365663534323336643539393137386437346330 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4943 pid=4960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232636664323636376365663534323336643539393137386437346330 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.576000 audit: BPF prog-id=191 op=LOAD Dec 13 02:01:26.576000 audit[4960]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00034c100 items=0 ppid=4943 pid=4960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232636664323636376365663534323336643539393137386437346330 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit: BPF prog-id=192 op=LOAD Dec 13 02:01:26.577000 audit[4960]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00034c148 items=0 ppid=4943 pid=4960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232636664323636376365663534323336643539393137386437346330 Dec 13 02:01:26.577000 audit: BPF prog-id=192 op=UNLOAD Dec 13 02:01:26.577000 audit: BPF prog-id=191 op=UNLOAD Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { perfmon } for pid=4960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit[4960]: AVC avc: denied { bpf } for pid=4960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.577000 audit: BPF prog-id=193 op=LOAD Dec 13 02:01:26.577000 audit[4960]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00034c558 items=0 ppid=4943 pid=4960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232636664323636376365663534323336643539393137386437346330 Dec 13 02:01:26.579399 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:26.589584 env[1219]: time="2024-12-13T02:01:26.589508030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bd74ff756-ts7cv,Uid:1184bdee-ddbd-4572-9358-2e64b0d4fb76,Namespace:calico-system,Attempt:1,} returns sandbox id \"79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6\"" Dec 13 02:01:26.608256 env[1219]: time="2024-12-13T02:01:26.608198794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6b995bdd-4fxb8,Uid:84cc8599-b8a8-43d2-8b5c-5a022da5fb55,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202\"" Dec 13 02:01:26.610736 env[1219]: time="2024-12-13T02:01:26.610707224Z" level=info msg="CreateContainer within sandbox \"22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:01:26.660212 env[1219]: time="2024-12-13T02:01:26.660150173Z" level=info msg="CreateContainer within sandbox \"22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4ee778385886d73e06c7dced59e21c10f58ac8f0135d4d134a0fd9e45d620e4b\"" Dec 13 02:01:26.660572 env[1219]: time="2024-12-13T02:01:26.660531075Z" level=info msg="StartContainer for \"4ee778385886d73e06c7dced59e21c10f58ac8f0135d4d134a0fd9e45d620e4b\"" Dec 13 02:01:26.673040 systemd[1]: Started cri-containerd-4ee778385886d73e06c7dced59e21c10f58ac8f0135d4d134a0fd9e45d620e4b.scope. Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit: BPF prog-id=194 op=LOAD Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4943 pid=4996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465653737383338353838366437336530366337646365643539653231 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4943 pid=4996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465653737383338353838366437336530366337646365643539653231 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit: BPF prog-id=195 op=LOAD Dec 13 02:01:26.683000 audit[4996]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002317e0 items=0 ppid=4943 pid=4996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465653737383338353838366437336530366337646365643539653231 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit: BPF prog-id=196 op=LOAD Dec 13 02:01:26.683000 audit[4996]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000231828 items=0 ppid=4943 pid=4996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465653737383338353838366437336530366337646365643539653231 Dec 13 02:01:26.683000 audit: BPF prog-id=196 op=UNLOAD Dec 13 02:01:26.683000 audit: BPF prog-id=195 op=UNLOAD Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { perfmon } for pid=4996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit[4996]: AVC avc: denied { bpf } for pid=4996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:26.683000 audit: BPF prog-id=197 op=LOAD Dec 13 02:01:26.683000 audit[4996]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000231c38 items=0 ppid=4943 pid=4996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465653737383338353838366437336530366337646365643539653231 Dec 13 02:01:26.708834 env[1219]: time="2024-12-13T02:01:26.708745086Z" level=info msg="StartContainer for \"4ee778385886d73e06c7dced59e21c10f58ac8f0135d4d134a0fd9e45d620e4b\" returns successfully" Dec 13 02:01:26.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.133:22-10.0.0.1:35046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:26.938487 systemd[1]: Started sshd@22-10.0.0.133:22-10.0.0.1:35046.service. Dec 13 02:01:26.939514 kernel: kauditd_printk_skb: 238 callbacks suppressed Dec 13 02:01:26.939638 kernel: audit: type=1130 audit(1734055286.937:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.133:22-10.0.0.1:35046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:26.972000 audit[5029]: USER_ACCT pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:26.976000 audit[5029]: CRED_ACQ pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:26.977715 sshd[5029]: Accepted publickey for core from 10.0.0.1 port 35046 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:26.978003 kernel: audit: type=1101 audit(1734055286.972:1428): pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:26.978057 kernel: audit: type=1103 audit(1734055286.976:1429): pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:26.978096 sshd[5029]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:26.983971 kernel: audit: type=1006 audit(1734055286.976:1430): pid=5029 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 02:01:26.982238 systemd[1]: Started session-23.scope. Dec 13 02:01:26.982640 systemd-logind[1206]: New session 23 of user core. Dec 13 02:01:26.976000 audit[5029]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe862d4a60 a2=3 a3=0 items=0 ppid=1 pid=5029 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.976000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:26.989622 kernel: audit: type=1300 audit(1734055286.976:1430): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe862d4a60 a2=3 a3=0 items=0 ppid=1 pid=5029 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:26.989674 kernel: audit: type=1327 audit(1734055286.976:1430): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:26.989695 kernel: audit: type=1105 audit(1734055286.986:1431): pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:26.986000 audit[5029]: USER_START pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:26.987000 audit[5031]: CRED_ACQ pid=5031 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:26.997176 kernel: audit: type=1103 audit(1734055286.987:1432): pid=5031 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:27.088387 sshd[5029]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:27.088000 audit[5029]: USER_END pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:27.089000 audit[5029]: CRED_DISP pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:27.094226 systemd[1]: sshd@22-10.0.0.133:22-10.0.0.1:35046.service: Deactivated successfully. Dec 13 02:01:27.094977 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:01:27.095639 systemd-logind[1206]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:01:27.096352 systemd-logind[1206]: Removed session 23. Dec 13 02:01:27.097991 kernel: audit: type=1106 audit(1734055287.088:1433): pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:27.098037 kernel: audit: type=1104 audit(1734055287.089:1434): pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:27.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.133:22-10.0.0.1:35046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:27.393000 audit[5007]: AVC avc: denied { watch } for pid=5007 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_00_33.100441071/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c31,c414 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c31,c414 tclass=file permissive=0 Dec 13 02:01:27.393000 audit[5007]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014a3520 a2=fc6 a3=0 items=0 ppid=4943 pid=5007 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c31,c414 key=(null) Dec 13 02:01:27.393000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:01:27.424280 kubelet[2076]: I1213 02:01:27.424225 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6f6b995bdd-4fxb8" podStartSLOduration=73.424207143 podStartE2EDuration="1m13.424207143s" podCreationTimestamp="2024-12-13 02:00:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:01:27.423997727 +0000 UTC m=+99.301047406" watchObservedRunningTime="2024-12-13 02:01:27.424207143 +0000 UTC m=+99.301256812" Dec 13 02:01:27.440000 audit[5042]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=5042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.440000 audit[5042]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc889014b0 a2=0 a3=7ffc8890149c items=0 ppid=2224 pid=5042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.445000 audit[5042]: NETFILTER_CFG table=nat:109 family=2 entries=24 op=nft_register_rule pid=5042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.445000 audit[5042]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffc889014b0 a2=0 a3=7ffc8890149c items=0 ppid=2224 pid=5042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.526000 audit[5044]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.526000 audit[5044]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd09a6df60 a2=0 a3=7ffd09a6df4c items=0 ppid=2224 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.534000 audit[5044]: NETFILTER_CFG table=nat:111 family=2 entries=28 op=nft_register_chain pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:27.534000 audit[5044]: SYSCALL arch=c000003e syscall=46 success=yes exit=8932 a0=3 a1=7ffd09a6df60 a2=0 a3=7ffd09a6df4c items=0 ppid=2224 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:27.534000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:27.685197 systemd-networkd[1037]: calicd20b7d68e7: Gained IPv6LL Dec 13 02:01:27.877073 systemd-networkd[1037]: cali20a9ddb9fea: Gained IPv6LL Dec 13 02:01:28.118233 env[1219]: time="2024-12-13T02:01:28.118117506Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:28.120125 env[1219]: time="2024-12-13T02:01:28.120081093Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:28.121455 env[1219]: time="2024-12-13T02:01:28.121429987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:28.122882 env[1219]: time="2024-12-13T02:01:28.122835858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:28.123276 env[1219]: time="2024-12-13T02:01:28.123240755Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:01:28.124541 env[1219]: time="2024-12-13T02:01:28.124502072Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:01:28.125589 env[1219]: time="2024-12-13T02:01:28.125561508Z" level=info msg="CreateContainer within sandbox \"2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:01:28.140176 env[1219]: time="2024-12-13T02:01:28.140123563Z" level=info msg="CreateContainer within sandbox \"2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"56d415c014ecdf483c5abad6b209c745a9f02306e7dec51ebcbc81f51b4746e3\"" Dec 13 02:01:28.140561 env[1219]: time="2024-12-13T02:01:28.140539270Z" level=info msg="StartContainer for \"56d415c014ecdf483c5abad6b209c745a9f02306e7dec51ebcbc81f51b4746e3\"" Dec 13 02:01:28.160214 systemd[1]: Started cri-containerd-56d415c014ecdf483c5abad6b209c745a9f02306e7dec51ebcbc81f51b4746e3.scope. Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7daa7be078 items=0 ppid=4844 pid=5053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536643431356330313465636466343833633561626164366232303963 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.173000 audit: BPF prog-id=198 op=LOAD Dec 13 02:01:28.173000 audit[5053]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003548d8 items=0 ppid=4844 pid=5053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536643431356330313465636466343833633561626164366232303963 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit: BPF prog-id=199 op=LOAD Dec 13 02:01:28.174000 audit[5053]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000354928 items=0 ppid=4844 pid=5053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536643431356330313465636466343833633561626164366232303963 Dec 13 02:01:28.174000 audit: BPF prog-id=199 op=UNLOAD Dec 13 02:01:28.174000 audit: BPF prog-id=198 op=UNLOAD Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { perfmon } for pid=5053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit[5053]: AVC avc: denied { bpf } for pid=5053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.174000 audit: BPF prog-id=200 op=LOAD Dec 13 02:01:28.174000 audit[5053]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003549b8 items=0 ppid=4844 pid=5053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536643431356330313465636466343833633561626164366232303963 Dec 13 02:01:28.190101 env[1219]: time="2024-12-13T02:01:28.189450900Z" level=info msg="StartContainer for \"56d415c014ecdf483c5abad6b209c745a9f02306e7dec51ebcbc81f51b4746e3\" returns successfully" Dec 13 02:01:28.198625 env[1219]: time="2024-12-13T02:01:28.198587717Z" level=info msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\"" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.237 [INFO][5101] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.237 [INFO][5101] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" iface="eth0" netns="/var/run/netns/cni-213b2dc8-3c1a-3321-155d-3487db5142bc" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.237 [INFO][5101] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" iface="eth0" netns="/var/run/netns/cni-213b2dc8-3c1a-3321-155d-3487db5142bc" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.237 [INFO][5101] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" iface="eth0" netns="/var/run/netns/cni-213b2dc8-3c1a-3321-155d-3487db5142bc" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.237 [INFO][5101] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.237 [INFO][5101] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.255 [INFO][5109] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" HandleID="k8s-pod-network.f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.255 [INFO][5109] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.255 [INFO][5109] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.260 [WARNING][5109] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" HandleID="k8s-pod-network.f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.260 [INFO][5109] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" HandleID="k8s-pod-network.f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.261 [INFO][5109] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:28.264327 env[1219]: 2024-12-13 02:01:28.262 [INFO][5101] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:28.264770 env[1219]: time="2024-12-13T02:01:28.264491512Z" level=info msg="TearDown network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" successfully" Dec 13 02:01:28.264770 env[1219]: time="2024-12-13T02:01:28.264527890Z" level=info msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" returns successfully" Dec 13 02:01:28.264835 kubelet[2076]: E1213 02:01:28.264812 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:28.265823 env[1219]: time="2024-12-13T02:01:28.265168894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v6gs7,Uid:0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0,Namespace:kube-system,Attempt:1,}" Dec 13 02:01:28.289996 systemd[1]: run-netns-cni\x2d213b2dc8\x2d3c1a\x2d3321\x2d155d\x2d3487db5142bc.mount: Deactivated successfully. Dec 13 02:01:28.325183 systemd-networkd[1037]: cali4d70402492b: Gained IPv6LL Dec 13 02:01:28.358250 systemd-networkd[1037]: cali0d7773fbffb: Link UP Dec 13 02:01:28.360891 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:01:28.361036 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0d7773fbffb: link becomes ready Dec 13 02:01:28.361045 systemd-networkd[1037]: cali0d7773fbffb: Gained carrier Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.306 [INFO][5117] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0 coredns-7db6d8ff4d- kube-system 0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0 1231 0 2024-12-13 02:00:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-v6gs7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0d7773fbffb [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6gs7" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--v6gs7-" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.306 [INFO][5117] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6gs7" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.327 [INFO][5129] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" HandleID="k8s-pod-network.1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.334 [INFO][5129] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" HandleID="k8s-pod-network.1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd150), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-v6gs7", "timestamp":"2024-12-13 02:01:28.327491731 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.334 [INFO][5129] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.334 [INFO][5129] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.334 [INFO][5129] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.335 [INFO][5129] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" host="localhost" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.338 [INFO][5129] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.341 [INFO][5129] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.343 [INFO][5129] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.344 [INFO][5129] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.345 [INFO][5129] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" host="localhost" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.346 [INFO][5129] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.349 [INFO][5129] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" host="localhost" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.353 [INFO][5129] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" host="localhost" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.353 [INFO][5129] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" host="localhost" Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.353 [INFO][5129] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:28.375047 env[1219]: 2024-12-13 02:01:28.353 [INFO][5129] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" HandleID="k8s-pod-network.1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.375618 env[1219]: 2024-12-13 02:01:28.355 [INFO][5117] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6gs7" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-v6gs7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d7773fbffb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:28.375618 env[1219]: 2024-12-13 02:01:28.355 [INFO][5117] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6gs7" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.375618 env[1219]: 2024-12-13 02:01:28.356 [INFO][5117] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0d7773fbffb ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6gs7" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.375618 env[1219]: 2024-12-13 02:01:28.361 [INFO][5117] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6gs7" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.375618 env[1219]: 2024-12-13 02:01:28.361 [INFO][5117] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6gs7" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c", Pod:"coredns-7db6d8ff4d-v6gs7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d7773fbffb", MAC:"a2:6f:56:e4:9e:60", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:28.375618 env[1219]: 2024-12-13 02:01:28.370 [INFO][5117] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6gs7" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:28.379000 audit[5152]: NETFILTER_CFG table=filter:112 family=2 entries=50 op=nft_register_chain pid=5152 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:28.379000 audit[5152]: SYSCALL arch=c000003e syscall=46 success=yes exit=23900 a0=3 a1=7ffc47f3c720 a2=0 a3=7ffc47f3c70c items=0 ppid=4386 pid=5152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.379000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:28.386247 env[1219]: time="2024-12-13T02:01:28.386174668Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:28.386247 env[1219]: time="2024-12-13T02:01:28.386214673Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:28.386465 env[1219]: time="2024-12-13T02:01:28.386238338Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:28.386465 env[1219]: time="2024-12-13T02:01:28.386412127Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c pid=5161 runtime=io.containerd.runc.v2 Dec 13 02:01:28.406372 systemd[1]: Started cri-containerd-1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c.scope. Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit: BPF prog-id=201 op=LOAD Dec 13 02:01:28.413000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[5171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5161 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164343865613837336433373666663639653136393161396466353663 Dec 13 02:01:28.413000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.413000 audit[5171]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5161 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164343865613837336433373666663639653136393161396466353663 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit: BPF prog-id=202 op=LOAD Dec 13 02:01:28.414000 audit[5171]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000288360 items=0 ppid=5161 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164343865613837336433373666663639653136393161396466353663 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit: BPF prog-id=203 op=LOAD Dec 13 02:01:28.414000 audit[5171]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002883a8 items=0 ppid=5161 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164343865613837336433373666663639653136393161396466353663 Dec 13 02:01:28.414000 audit: BPF prog-id=203 op=UNLOAD Dec 13 02:01:28.414000 audit: BPF prog-id=202 op=UNLOAD Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { perfmon } for pid=5171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit[5171]: AVC avc: denied { bpf } for pid=5171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.414000 audit: BPF prog-id=204 op=LOAD Dec 13 02:01:28.414000 audit[5171]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002887b8 items=0 ppid=5161 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164343865613837336433373666663639653136393161396466353663 Dec 13 02:01:28.415981 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:28.436691 env[1219]: time="2024-12-13T02:01:28.436647663Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v6gs7,Uid:0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0,Namespace:kube-system,Attempt:1,} returns sandbox id \"1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c\"" Dec 13 02:01:28.437487 kubelet[2076]: E1213 02:01:28.437464 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:28.439658 env[1219]: time="2024-12-13T02:01:28.439636681Z" level=info msg="CreateContainer within sandbox \"1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:01:28.456423 env[1219]: time="2024-12-13T02:01:28.456372271Z" level=info msg="CreateContainer within sandbox \"1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9f805f5978d8bca6779d62de1509767b33cd8d41e2528b209b86f66b209c8777\"" Dec 13 02:01:28.457031 env[1219]: time="2024-12-13T02:01:28.457000060Z" level=info msg="StartContainer for \"9f805f5978d8bca6779d62de1509767b33cd8d41e2528b209b86f66b209c8777\"" Dec 13 02:01:28.470552 systemd[1]: Started cri-containerd-9f805f5978d8bca6779d62de1509767b33cd8d41e2528b209b86f66b209c8777.scope. Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit: BPF prog-id=205 op=LOAD Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5161 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383035663539373864386263613637373964363264653135303937 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5161 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383035663539373864386263613637373964363264653135303937 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit: BPF prog-id=206 op=LOAD Dec 13 02:01:28.482000 audit[5202]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d4a40 items=0 ppid=5161 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383035663539373864386263613637373964363264653135303937 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit: BPF prog-id=207 op=LOAD Dec 13 02:01:28.482000 audit[5202]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d4a88 items=0 ppid=5161 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383035663539373864386263613637373964363264653135303937 Dec 13 02:01:28.482000 audit: BPF prog-id=207 op=UNLOAD Dec 13 02:01:28.482000 audit: BPF prog-id=206 op=UNLOAD Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:28.482000 audit: BPF prog-id=208 op=LOAD Dec 13 02:01:28.482000 audit[5202]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d4e98 items=0 ppid=5161 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:28.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966383035663539373864386263613637373964363264653135303937 Dec 13 02:01:28.494672 env[1219]: time="2024-12-13T02:01:28.494639501Z" level=info msg="StartContainer for \"9f805f5978d8bca6779d62de1509767b33cd8d41e2528b209b86f66b209c8777\" returns successfully" Dec 13 02:01:29.197270 env[1219]: time="2024-12-13T02:01:29.197229398Z" level=info msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\"" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.236 [INFO][5250] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.236 [INFO][5250] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" iface="eth0" netns="/var/run/netns/cni-eb8a27a1-fc36-02af-69f6-a05eea497ff2" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.237 [INFO][5250] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" iface="eth0" netns="/var/run/netns/cni-eb8a27a1-fc36-02af-69f6-a05eea497ff2" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.237 [INFO][5250] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" iface="eth0" netns="/var/run/netns/cni-eb8a27a1-fc36-02af-69f6-a05eea497ff2" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.237 [INFO][5250] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.237 [INFO][5250] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.257 [INFO][5257] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" HandleID="k8s-pod-network.091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.258 [INFO][5257] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.258 [INFO][5257] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.263 [WARNING][5257] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" HandleID="k8s-pod-network.091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.263 [INFO][5257] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" HandleID="k8s-pod-network.091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.264 [INFO][5257] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:29.267822 env[1219]: 2024-12-13 02:01:29.265 [INFO][5250] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:29.268494 env[1219]: time="2024-12-13T02:01:29.268016024Z" level=info msg="TearDown network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" successfully" Dec 13 02:01:29.268494 env[1219]: time="2024-12-13T02:01:29.268047052Z" level=info msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" returns successfully" Dec 13 02:01:29.268576 kubelet[2076]: E1213 02:01:29.268372 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:29.269063 env[1219]: time="2024-12-13T02:01:29.269022418Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4qj2w,Uid:88080b51-d429-4316-8cdf-3f4303a92112,Namespace:kube-system,Attempt:1,}" Dec 13 02:01:29.289964 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1277146730.mount: Deactivated successfully. Dec 13 02:01:29.290092 systemd[1]: run-netns-cni\x2deb8a27a1\x2dfc36\x2d02af\x2d69f6\x2da05eea497ff2.mount: Deactivated successfully. Dec 13 02:01:29.401403 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:01:29.401535 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali64ef43fe0b0: link becomes ready Dec 13 02:01:29.399073 systemd-networkd[1037]: cali64ef43fe0b0: Link UP Dec 13 02:01:29.402041 systemd-networkd[1037]: cali64ef43fe0b0: Gained carrier Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.341 [INFO][5265] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0 coredns-7db6d8ff4d- kube-system 88080b51-d429-4316-8cdf-3f4303a92112 1247 0 2024-12-13 02:00:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-4qj2w eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali64ef43fe0b0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4qj2w" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--4qj2w-" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.342 [INFO][5265] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4qj2w" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.366 [INFO][5280] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" HandleID="k8s-pod-network.9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.374 [INFO][5280] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" HandleID="k8s-pod-network.9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cd00), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-4qj2w", "timestamp":"2024-12-13 02:01:29.366450057 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.374 [INFO][5280] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.374 [INFO][5280] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.374 [INFO][5280] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.375 [INFO][5280] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" host="localhost" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.378 [INFO][5280] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.381 [INFO][5280] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.383 [INFO][5280] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.385 [INFO][5280] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.385 [INFO][5280] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" host="localhost" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.386 [INFO][5280] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5 Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.389 [INFO][5280] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" host="localhost" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.394 [INFO][5280] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" host="localhost" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.394 [INFO][5280] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" host="localhost" Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.394 [INFO][5280] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:29.415990 env[1219]: 2024-12-13 02:01:29.394 [INFO][5280] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" HandleID="k8s-pod-network.9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.416974 env[1219]: 2024-12-13 02:01:29.396 [INFO][5265] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4qj2w" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"88080b51-d429-4316-8cdf-3f4303a92112", ResourceVersion:"1247", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-4qj2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64ef43fe0b0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:29.416974 env[1219]: 2024-12-13 02:01:29.396 [INFO][5265] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4qj2w" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.416974 env[1219]: 2024-12-13 02:01:29.397 [INFO][5265] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali64ef43fe0b0 ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4qj2w" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.416974 env[1219]: 2024-12-13 02:01:29.401 [INFO][5265] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4qj2w" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.416974 env[1219]: 2024-12-13 02:01:29.401 [INFO][5265] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4qj2w" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"88080b51-d429-4316-8cdf-3f4303a92112", ResourceVersion:"1247", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5", Pod:"coredns-7db6d8ff4d-4qj2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64ef43fe0b0", MAC:"1a:41:b8:6c:af:c0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:29.416974 env[1219]: 2024-12-13 02:01:29.413 [INFO][5265] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4qj2w" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:29.425503 kubelet[2076]: E1213 02:01:29.425411 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:29.426000 audit[5297]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=5297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:01:29.426000 audit[5297]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7fff0fb2a810 a2=0 a3=7fff0fb2a7fc items=0 ppid=4386 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.426000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:01:29.434277 env[1219]: time="2024-12-13T02:01:29.434169458Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:29.434277 env[1219]: time="2024-12-13T02:01:29.434222278Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:29.434277 env[1219]: time="2024-12-13T02:01:29.434235403Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:29.434566 env[1219]: time="2024-12-13T02:01:29.434470497Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5 pid=5310 runtime=io.containerd.runc.v2 Dec 13 02:01:29.448154 kubelet[2076]: I1213 02:01:29.446729 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-v6gs7" podStartSLOduration=86.44670854 podStartE2EDuration="1m26.44670854s" podCreationTimestamp="2024-12-13 02:00:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:01:29.444917811 +0000 UTC m=+101.321967480" watchObservedRunningTime="2024-12-13 02:01:29.44670854 +0000 UTC m=+101.323758199" Dec 13 02:01:29.453000 audit[5330]: NETFILTER_CFG table=filter:114 family=2 entries=14 op=nft_register_rule pid=5330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:29.453000 audit[5330]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffea9a01f70 a2=0 a3=7ffea9a01f5c items=0 ppid=2224 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:29.458266 systemd[1]: Started cri-containerd-9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5.scope. Dec 13 02:01:29.463000 audit[5330]: NETFILTER_CFG table=nat:115 family=2 entries=16 op=nft_register_rule pid=5330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:29.463000 audit[5330]: SYSCALL arch=c000003e syscall=46 success=yes exit=4236 a0=3 a1=7ffea9a01f70 a2=0 a3=0 items=0 ppid=2224 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit: BPF prog-id=209 op=LOAD Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5310 pid=5319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653462633763613133346361346235393861386166666433343865 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5310 pid=5319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653462633763613133346361346235393861386166666433343865 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit: BPF prog-id=210 op=LOAD Dec 13 02:01:29.472000 audit[5319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000255e00 items=0 ppid=5310 pid=5319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653462633763613133346361346235393861386166666433343865 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit: BPF prog-id=211 op=LOAD Dec 13 02:01:29.472000 audit[5319]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000255e48 items=0 ppid=5310 pid=5319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653462633763613133346361346235393861386166666433343865 Dec 13 02:01:29.472000 audit: BPF prog-id=211 op=UNLOAD Dec 13 02:01:29.472000 audit: BPF prog-id=210 op=UNLOAD Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { perfmon } for pid=5319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit[5319]: AVC avc: denied { bpf } for pid=5319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.472000 audit: BPF prog-id=212 op=LOAD Dec 13 02:01:29.472000 audit[5319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00027c258 items=0 ppid=5310 pid=5319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653462633763613133346361346235393861386166666433343865 Dec 13 02:01:29.473000 audit[5339]: NETFILTER_CFG table=filter:116 family=2 entries=11 op=nft_register_rule pid=5339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:29.473000 audit[5339]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb616f590 a2=0 a3=7ffdb616f57c items=0 ppid=2224 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:29.474911 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:01:29.477000 audit[5339]: NETFILTER_CFG table=nat:117 family=2 entries=37 op=nft_register_chain pid=5339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:29.477000 audit[5339]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffdb616f590 a2=0 a3=7ffdb616f57c items=0 ppid=2224 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:29.496423 env[1219]: time="2024-12-13T02:01:29.496377057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4qj2w,Uid:88080b51-d429-4316-8cdf-3f4303a92112,Namespace:kube-system,Attempt:1,} returns sandbox id \"9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5\"" Dec 13 02:01:29.497073 kubelet[2076]: E1213 02:01:29.497042 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:29.501354 env[1219]: time="2024-12-13T02:01:29.500665323Z" level=info msg="CreateContainer within sandbox \"9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:01:29.521675 env[1219]: time="2024-12-13T02:01:29.521623660Z" level=info msg="CreateContainer within sandbox \"9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a04fa098c167c1b2e6a5143367211673eb2e507e06245f6e55113b7a092cd678\"" Dec 13 02:01:29.522124 env[1219]: time="2024-12-13T02:01:29.522092387Z" level=info msg="StartContainer for \"a04fa098c167c1b2e6a5143367211673eb2e507e06245f6e55113b7a092cd678\"" Dec 13 02:01:29.536018 systemd[1]: Started cri-containerd-a04fa098c167c1b2e6a5143367211673eb2e507e06245f6e55113b7a092cd678.scope. Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.549000 audit: BPF prog-id=213 op=LOAD Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5310 pid=5354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346661303938633136376331623265366135313433333637323131 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5310 pid=5354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346661303938633136376331623265366135313433333637323131 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit: BPF prog-id=214 op=LOAD Dec 13 02:01:29.550000 audit[5354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfd40 items=0 ppid=5310 pid=5354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346661303938633136376331623265366135313433333637323131 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit: BPF prog-id=215 op=LOAD Dec 13 02:01:29.550000 audit[5354]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd88 items=0 ppid=5310 pid=5354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346661303938633136376331623265366135313433333637323131 Dec 13 02:01:29.550000 audit: BPF prog-id=215 op=UNLOAD Dec 13 02:01:29.550000 audit: BPF prog-id=214 op=UNLOAD Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { perfmon } for pid=5354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit[5354]: AVC avc: denied { bpf } for pid=5354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.550000 audit: BPF prog-id=216 op=LOAD Dec 13 02:01:29.550000 audit[5354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ae198 items=0 ppid=5310 pid=5354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:29.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130346661303938633136376331623265366135313433333637323131 Dec 13 02:01:29.700906 env[1219]: time="2024-12-13T02:01:29.700768062Z" level=info msg="StartContainer for \"a04fa098c167c1b2e6a5143367211673eb2e507e06245f6e55113b7a092cd678\" returns successfully" Dec 13 02:01:30.117611 systemd-networkd[1037]: cali0d7773fbffb: Gained IPv6LL Dec 13 02:01:30.428716 kubelet[2076]: E1213 02:01:30.428684 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:30.429428 kubelet[2076]: E1213 02:01:30.429299 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:30.438774 kubelet[2076]: I1213 02:01:30.438725 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-4qj2w" podStartSLOduration=87.43871661 podStartE2EDuration="1m27.43871661s" podCreationTimestamp="2024-12-13 02:00:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:01:30.437660683 +0000 UTC m=+102.314710352" watchObservedRunningTime="2024-12-13 02:01:30.43871661 +0000 UTC m=+102.315766279" Dec 13 02:01:30.456000 audit[5386]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=5386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:30.456000 audit[5386]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf2a1e800 a2=0 a3=7ffdf2a1e7ec items=0 ppid=2224 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:30.462000 audit[5386]: NETFILTER_CFG table=nat:119 family=2 entries=58 op=nft_register_chain pid=5386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:30.462000 audit[5386]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffdf2a1e800 a2=0 a3=7ffdf2a1e7ec items=0 ppid=2224 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:30.470000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:30.470000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c7c9c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:01:30.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:30.470000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:30.470000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002551980 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:01:30.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:30.885099 systemd-networkd[1037]: cali64ef43fe0b0: Gained IPv6LL Dec 13 02:01:31.190892 env[1219]: time="2024-12-13T02:01:31.190781331Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:31.192929 env[1219]: time="2024-12-13T02:01:31.192908516Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:31.194312 env[1219]: time="2024-12-13T02:01:31.194259262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:31.195736 env[1219]: time="2024-12-13T02:01:31.195692694Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:31.196128 env[1219]: time="2024-12-13T02:01:31.196105244Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:01:31.197163 env[1219]: time="2024-12-13T02:01:31.197123311Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:01:31.206923 env[1219]: time="2024-12-13T02:01:31.206889289Z" level=info msg="CreateContainer within sandbox \"79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:01:31.220289 env[1219]: time="2024-12-13T02:01:31.220238897Z" level=info msg="CreateContainer within sandbox \"79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b316ea54efdb2c722931606ec35ac5e5759446b9234002500b349e0dea717243\"" Dec 13 02:01:31.220701 env[1219]: time="2024-12-13T02:01:31.220673679Z" level=info msg="StartContainer for \"b316ea54efdb2c722931606ec35ac5e5759446b9234002500b349e0dea717243\"" Dec 13 02:01:31.237269 systemd[1]: Started cri-containerd-b316ea54efdb2c722931606ec35ac5e5759446b9234002500b349e0dea717243.scope. Dec 13 02:01:31.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit: BPF prog-id=217 op=LOAD Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4893 pid=5396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313665613534656664623263373232393331363036656333356163 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4893 pid=5396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313665613534656664623263373232393331363036656333356163 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.246000 audit: BPF prog-id=218 op=LOAD Dec 13 02:01:31.246000 audit[5396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000309490 items=0 ppid=4893 pid=5396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313665613534656664623263373232393331363036656333356163 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit: BPF prog-id=219 op=LOAD Dec 13 02:01:31.247000 audit[5396]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003094d8 items=0 ppid=4893 pid=5396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313665613534656664623263373232393331363036656333356163 Dec 13 02:01:31.247000 audit: BPF prog-id=219 op=UNLOAD Dec 13 02:01:31.247000 audit: BPF prog-id=218 op=UNLOAD Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { perfmon } for pid=5396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit[5396]: AVC avc: denied { bpf } for pid=5396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.247000 audit: BPF prog-id=220 op=LOAD Dec 13 02:01:31.247000 audit[5396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003098e8 items=0 ppid=4893 pid=5396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313665613534656664623263373232393331363036656333356163 Dec 13 02:01:31.433569 env[1219]: time="2024-12-13T02:01:31.433292648Z" level=info msg="StartContainer for \"b316ea54efdb2c722931606ec35ac5e5759446b9234002500b349e0dea717243\" returns successfully" Dec 13 02:01:31.435687 kubelet[2076]: E1213 02:01:31.435665 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:31.436028 kubelet[2076]: E1213 02:01:31.436011 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:32.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.133:22-10.0.0.1:35054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:32.092227 systemd[1]: Started sshd@23-10.0.0.133:22-10.0.0.1:35054.service. Dec 13 02:01:32.093469 kernel: kauditd_printk_skb: 374 callbacks suppressed Dec 13 02:01:32.093522 kernel: audit: type=1130 audit(1734055292.090:1547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.133:22-10.0.0.1:35054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:32.125000 audit[5426]: USER_ACCT pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.127720 sshd[5426]: Accepted publickey for core from 10.0.0.1 port 35054 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:32.129000 audit[5426]: CRED_ACQ pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.131466 sshd[5426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:32.134534 systemd-logind[1206]: New session 24 of user core. Dec 13 02:01:32.135092 kernel: audit: type=1101 audit(1734055292.125:1548): pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.135199 kernel: audit: type=1103 audit(1734055292.129:1549): pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.135317 systemd[1]: Started session-24.scope. Dec 13 02:01:32.137542 kernel: audit: type=1006 audit(1734055292.129:1550): pid=5426 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:01:32.137635 kernel: audit: type=1300 audit(1734055292.129:1550): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecdd5d540 a2=3 a3=0 items=0 ppid=1 pid=5426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.129000 audit[5426]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecdd5d540 a2=3 a3=0 items=0 ppid=1 pid=5426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.129000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:32.142852 kernel: audit: type=1327 audit(1734055292.129:1550): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:32.142884 kernel: audit: type=1105 audit(1734055292.137:1551): pid=5426 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.137000 audit[5426]: USER_START pid=5426 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.138000 audit[5428]: CRED_ACQ pid=5428 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.150410 kernel: audit: type=1103 audit(1734055292.138:1552): pid=5428 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.282351 sshd[5426]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:32.281000 audit[5426]: USER_END pid=5426 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.284782 systemd[1]: sshd@23-10.0.0.133:22-10.0.0.1:35054.service: Deactivated successfully. Dec 13 02:01:32.285435 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:01:32.286397 systemd-logind[1206]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:01:32.287113 systemd-logind[1206]: Removed session 24. Dec 13 02:01:32.281000 audit[5426]: CRED_DISP pid=5426 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.290972 kernel: audit: type=1106 audit(1734055292.281:1553): pid=5426 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.291021 kernel: audit: type=1104 audit(1734055292.281:1554): pid=5426 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:32.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.133:22-10.0.0.1:35054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:32.437240 kubelet[2076]: E1213 02:01:32.437201 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:32.445280 kubelet[2076]: I1213 02:01:32.445060 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5bd74ff756-ts7cv" podStartSLOduration=73.8385111 podStartE2EDuration="1m18.445042568s" podCreationTimestamp="2024-12-13 02:00:14 +0000 UTC" firstStartedPulling="2024-12-13 02:01:26.590412813 +0000 UTC m=+98.467462483" lastFinishedPulling="2024-12-13 02:01:31.196944282 +0000 UTC m=+103.073993951" observedRunningTime="2024-12-13 02:01:32.44456315 +0000 UTC m=+104.321612820" watchObservedRunningTime="2024-12-13 02:01:32.445042568 +0000 UTC m=+104.322092237" Dec 13 02:01:32.980006 env[1219]: time="2024-12-13T02:01:32.979949055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.982113 env[1219]: time="2024-12-13T02:01:32.982049790Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.983486 env[1219]: time="2024-12-13T02:01:32.983435631Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.984766 env[1219]: time="2024-12-13T02:01:32.984744928Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.985311 env[1219]: time="2024-12-13T02:01:32.985274249Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:01:32.987287 env[1219]: time="2024-12-13T02:01:32.987260116Z" level=info msg="CreateContainer within sandbox \"2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:01:32.999757 env[1219]: time="2024-12-13T02:01:32.999713726Z" level=info msg="CreateContainer within sandbox \"2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d1d5541ec18ca784ea799b2c0d249b2affcdd4fc0a0eb80ec62dfe02db8f0d21\"" Dec 13 02:01:33.000169 env[1219]: time="2024-12-13T02:01:33.000140462Z" level=info msg="StartContainer for \"d1d5541ec18ca784ea799b2c0d249b2affcdd4fc0a0eb80ec62dfe02db8f0d21\"" Dec 13 02:01:33.021143 systemd[1]: Started cri-containerd-d1d5541ec18ca784ea799b2c0d249b2affcdd4fc0a0eb80ec62dfe02db8f0d21.scope. Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f7be8af3578 items=0 ppid=4844 pid=5447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:33.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643535343165633138636137383465613739396232633064323439 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit: BPF prog-id=221 op=LOAD Dec 13 02:01:33.029000 audit[5447]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000318ef8 items=0 ppid=4844 pid=5447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:33.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643535343165633138636137383465613739396232633064323439 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit: BPF prog-id=222 op=LOAD Dec 13 02:01:33.029000 audit[5447]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000318f48 items=0 ppid=4844 pid=5447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:33.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643535343165633138636137383465613739396232633064323439 Dec 13 02:01:33.029000 audit: BPF prog-id=222 op=UNLOAD Dec 13 02:01:33.029000 audit: BPF prog-id=221 op=UNLOAD Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { perfmon } for pid=5447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit[5447]: AVC avc: denied { bpf } for pid=5447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:33.029000 audit: BPF prog-id=223 op=LOAD Dec 13 02:01:33.029000 audit[5447]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000318fd8 items=0 ppid=4844 pid=5447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:33.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643535343165633138636137383465613739396232633064323439 Dec 13 02:01:33.045071 env[1219]: time="2024-12-13T02:01:33.043905584Z" level=info msg="StartContainer for \"d1d5541ec18ca784ea799b2c0d249b2affcdd4fc0a0eb80ec62dfe02db8f0d21\" returns successfully" Dec 13 02:01:33.292474 kubelet[2076]: I1213 02:01:33.292369 2076 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:01:33.292474 kubelet[2076]: I1213 02:01:33.292406 2076 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:01:33.491713 kubelet[2076]: I1213 02:01:33.491605 2076 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-v75ck" podStartSLOduration=73.054206844 podStartE2EDuration="1m19.491583697s" podCreationTimestamp="2024-12-13 02:00:14 +0000 UTC" firstStartedPulling="2024-12-13 02:01:26.548648356 +0000 UTC m=+98.425698025" lastFinishedPulling="2024-12-13 02:01:32.986025209 +0000 UTC m=+104.863074878" observedRunningTime="2024-12-13 02:01:33.491570984 +0000 UTC m=+105.368620653" watchObservedRunningTime="2024-12-13 02:01:33.491583697 +0000 UTC m=+105.368633366" Dec 13 02:01:37.285777 systemd[1]: Started sshd@24-10.0.0.133:22-10.0.0.1:34196.service. Dec 13 02:01:37.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.133:22-10.0.0.1:34196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:37.286786 kernel: kauditd_printk_skb: 44 callbacks suppressed Dec 13 02:01:37.286837 kernel: audit: type=1130 audit(1734055297.284:1562): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.133:22-10.0.0.1:34196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:37.319000 audit[5521]: USER_ACCT pid=5521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.321111 sshd[5521]: Accepted publickey for core from 10.0.0.1 port 34196 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:37.323000 audit[5521]: CRED_ACQ pid=5521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.325267 sshd[5521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:37.328600 kernel: audit: type=1101 audit(1734055297.319:1563): pid=5521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.328685 kernel: audit: type=1103 audit(1734055297.323:1564): pid=5521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.328710 kernel: audit: type=1006 audit(1734055297.323:1565): pid=5521 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:01:37.328797 systemd-logind[1206]: New session 25 of user core. Dec 13 02:01:37.329270 systemd[1]: Started session-25.scope. Dec 13 02:01:37.330772 kernel: audit: type=1300 audit(1734055297.323:1565): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd705a5f80 a2=3 a3=0 items=0 ppid=1 pid=5521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:37.323000 audit[5521]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd705a5f80 a2=3 a3=0 items=0 ppid=1 pid=5521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:37.334741 kernel: audit: type=1327 audit(1734055297.323:1565): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:37.323000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:37.332000 audit[5521]: USER_START pid=5521 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.340178 kernel: audit: type=1105 audit(1734055297.332:1566): pid=5521 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.340242 kernel: audit: type=1103 audit(1734055297.333:1567): pid=5523 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.333000 audit[5523]: CRED_ACQ pid=5523 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.447651 sshd[5521]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:37.447000 audit[5521]: USER_END pid=5521 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.447000 audit[5521]: CRED_DISP pid=5521 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.450647 systemd[1]: sshd@24-10.0.0.133:22-10.0.0.1:34196.service: Deactivated successfully. Dec 13 02:01:37.451133 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:01:37.451679 systemd-logind[1206]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:01:37.452530 systemd[1]: Started sshd@25-10.0.0.133:22-10.0.0.1:34210.service. Dec 13 02:01:37.453473 systemd-logind[1206]: Removed session 25. Dec 13 02:01:37.456383 kernel: audit: type=1106 audit(1734055297.447:1568): pid=5521 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.456432 kernel: audit: type=1104 audit(1734055297.447:1569): pid=5521 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.133:22-10.0.0.1:34196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:37.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.133:22-10.0.0.1:34210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:37.483000 audit[5534]: USER_ACCT pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.484792 sshd[5534]: Accepted publickey for core from 10.0.0.1 port 34210 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:37.484000 audit[5534]: CRED_ACQ pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.484000 audit[5534]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe03def5d0 a2=3 a3=0 items=0 ppid=1 pid=5534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:37.484000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:37.485791 sshd[5534]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:37.488751 systemd-logind[1206]: New session 26 of user core. Dec 13 02:01:37.489427 systemd[1]: Started session-26.scope. Dec 13 02:01:37.491000 audit[5534]: USER_START pid=5534 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.492000 audit[5536]: CRED_ACQ pid=5536 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.650034 sshd[5534]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:37.650000 audit[5534]: USER_END pid=5534 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.650000 audit[5534]: CRED_DISP pid=5534 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.652574 systemd[1]: sshd@25-10.0.0.133:22-10.0.0.1:34210.service: Deactivated successfully. Dec 13 02:01:37.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.133:22-10.0.0.1:34210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:37.653070 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 02:01:37.653490 systemd-logind[1206]: Session 26 logged out. Waiting for processes to exit. Dec 13 02:01:37.654305 systemd[1]: Started sshd@26-10.0.0.133:22-10.0.0.1:34214.service. Dec 13 02:01:37.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.133:22-10.0.0.1:34214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:37.654912 systemd-logind[1206]: Removed session 26. Dec 13 02:01:37.685000 audit[5545]: USER_ACCT pid=5545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.686216 sshd[5545]: Accepted publickey for core from 10.0.0.1 port 34214 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:37.685000 audit[5545]: CRED_ACQ pid=5545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.685000 audit[5545]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe757d8510 a2=3 a3=0 items=0 ppid=1 pid=5545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:37.685000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:37.686998 sshd[5545]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:37.690013 systemd-logind[1206]: New session 27 of user core. Dec 13 02:01:37.690690 systemd[1]: Started session-27.scope. Dec 13 02:01:37.693000 audit[5545]: USER_START pid=5545 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:37.693000 audit[5547]: CRED_ACQ pid=5547 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.164000 audit[5569]: NETFILTER_CFG table=filter:120 family=2 entries=20 op=nft_register_rule pid=5569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.164000 audit[5569]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdcb1c6fc0 a2=0 a3=7ffdcb1c6fac items=0 ppid=2224 pid=5569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.173000 audit[5569]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.173000 audit[5569]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdcb1c6fc0 a2=0 a3=0 items=0 ppid=2224 pid=5569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.176043 sshd[5545]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:39.177000 audit[5545]: USER_END pid=5545 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.177000 audit[5545]: CRED_DISP pid=5545 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.179700 systemd[1]: Started sshd@27-10.0.0.133:22-10.0.0.1:34216.service. Dec 13 02:01:39.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.133:22-10.0.0.1:34216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:39.180566 systemd[1]: sshd@26-10.0.0.133:22-10.0.0.1:34214.service: Deactivated successfully. Dec 13 02:01:39.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.133:22-10.0.0.1:34214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:39.181152 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 02:01:39.181721 systemd-logind[1206]: Session 27 logged out. Waiting for processes to exit. Dec 13 02:01:39.182564 systemd-logind[1206]: Removed session 27. Dec 13 02:01:39.188000 audit[5574]: NETFILTER_CFG table=filter:122 family=2 entries=32 op=nft_register_rule pid=5574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.188000 audit[5574]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff6f851bc0 a2=0 a3=7fff6f851bac items=0 ppid=2224 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.196000 audit[5574]: NETFILTER_CFG table=nat:123 family=2 entries=22 op=nft_register_rule pid=5574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:39.196000 audit[5574]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff6f851bc0 a2=0 a3=0 items=0 ppid=2224 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:39.215000 audit[5571]: USER_ACCT pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.216958 sshd[5571]: Accepted publickey for core from 10.0.0.1 port 34216 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:39.216000 audit[5571]: CRED_ACQ pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.216000 audit[5571]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3bfd2680 a2=3 a3=0 items=0 ppid=1 pid=5571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.216000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:39.217977 sshd[5571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:39.222362 systemd[1]: Started session-28.scope. Dec 13 02:01:39.222637 systemd-logind[1206]: New session 28 of user core. Dec 13 02:01:39.225000 audit[5571]: USER_START pid=5571 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.226000 audit[5576]: CRED_ACQ pid=5576 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.501954 sshd[5571]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:39.505030 systemd[1]: Started sshd@28-10.0.0.133:22-10.0.0.1:34224.service. Dec 13 02:01:39.505446 systemd[1]: sshd@27-10.0.0.133:22-10.0.0.1:34216.service: Deactivated successfully. Dec 13 02:01:39.502000 audit[5571]: USER_END pid=5571 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.502000 audit[5571]: CRED_DISP pid=5571 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.133:22-10.0.0.1:34224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:39.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.133:22-10.0.0.1:34216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:39.506031 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 02:01:39.507271 systemd-logind[1206]: Session 28 logged out. Waiting for processes to exit. Dec 13 02:01:39.508102 systemd-logind[1206]: Removed session 28. Dec 13 02:01:39.536000 audit[5586]: USER_ACCT pid=5586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.537913 sshd[5586]: Accepted publickey for core from 10.0.0.1 port 34224 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:39.537000 audit[5586]: CRED_ACQ pid=5586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.537000 audit[5586]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7fb19de0 a2=3 a3=0 items=0 ppid=1 pid=5586 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:39.537000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:39.538978 sshd[5586]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:39.542744 systemd-logind[1206]: New session 29 of user core. Dec 13 02:01:39.543065 systemd[1]: Started session-29.scope. Dec 13 02:01:39.547000 audit[5586]: USER_START pid=5586 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.549000 audit[5591]: CRED_ACQ pid=5591 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.651807 sshd[5586]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:39.651000 audit[5586]: USER_END pid=5586 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.651000 audit[5586]: CRED_DISP pid=5586 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:39.654299 systemd[1]: sshd@28-10.0.0.133:22-10.0.0.1:34224.service: Deactivated successfully. Dec 13 02:01:39.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.133:22-10.0.0.1:34224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:39.654967 systemd[1]: session-29.scope: Deactivated successfully. Dec 13 02:01:39.655433 systemd-logind[1206]: Session 29 logged out. Waiting for processes to exit. Dec 13 02:01:39.656073 systemd-logind[1206]: Removed session 29. Dec 13 02:01:44.656383 systemd[1]: Started sshd@29-10.0.0.133:22-10.0.0.1:34228.service. Dec 13 02:01:44.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.133:22-10.0.0.1:34228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:44.657960 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 02:01:44.658022 kernel: audit: type=1130 audit(1734055304.655:1611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.133:22-10.0.0.1:34228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:44.670000 audit[5606]: NETFILTER_CFG table=filter:124 family=2 entries=20 op=nft_register_rule pid=5606 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:44.670000 audit[5606]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffd135cb10 a2=0 a3=7fffd135cafc items=0 ppid=2224 pid=5606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.678276 kernel: audit: type=1325 audit(1734055304.670:1612): table=filter:124 family=2 entries=20 op=nft_register_rule pid=5606 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:44.678326 kernel: audit: type=1300 audit(1734055304.670:1612): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffd135cb10 a2=0 a3=7fffd135cafc items=0 ppid=2224 pid=5606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.678346 kernel: audit: type=1327 audit(1734055304.670:1612): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:44.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:44.683000 audit[5606]: NETFILTER_CFG table=nat:125 family=2 entries=106 op=nft_register_chain pid=5606 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:44.683000 audit[5606]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffd135cb10 a2=0 a3=7fffd135cafc items=0 ppid=2224 pid=5606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.688619 sshd[5603]: Accepted publickey for core from 10.0.0.1 port 34228 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:44.689739 sshd[5603]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:44.692035 kernel: audit: type=1325 audit(1734055304.683:1613): table=nat:125 family=2 entries=106 op=nft_register_chain pid=5606 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:44.692078 kernel: audit: type=1300 audit(1734055304.683:1613): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffd135cb10 a2=0 a3=7fffd135cafc items=0 ppid=2224 pid=5606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.692106 kernel: audit: type=1327 audit(1734055304.683:1613): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:44.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:44.693734 systemd-logind[1206]: New session 30 of user core. Dec 13 02:01:44.694135 kernel: audit: type=1101 audit(1734055304.687:1614): pid=5603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:44.687000 audit[5603]: USER_ACCT pid=5603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:44.694729 systemd[1]: Started session-30.scope. Dec 13 02:01:44.688000 audit[5603]: CRED_ACQ pid=5603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:44.701572 kernel: audit: type=1103 audit(1734055304.688:1615): pid=5603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:44.701621 kernel: audit: type=1006 audit(1734055304.688:1616): pid=5603 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Dec 13 02:01:44.688000 audit[5603]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3cf2b200 a2=3 a3=0 items=0 ppid=1 pid=5603 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:44.688000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:44.698000 audit[5603]: USER_START pid=5603 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:44.699000 audit[5607]: CRED_ACQ pid=5607 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:44.795563 sshd[5603]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:44.795000 audit[5603]: USER_END pid=5603 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:44.795000 audit[5603]: CRED_DISP pid=5603 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:44.797719 systemd[1]: sshd@29-10.0.0.133:22-10.0.0.1:34228.service: Deactivated successfully. Dec 13 02:01:44.798419 systemd[1]: session-30.scope: Deactivated successfully. Dec 13 02:01:44.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.133:22-10.0.0.1:34228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:44.798987 systemd-logind[1206]: Session 30 logged out. Waiting for processes to exit. Dec 13 02:01:44.799606 systemd-logind[1206]: Removed session 30. Dec 13 02:01:44.996903 kubelet[2076]: E1213 02:01:44.996786 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:45.667000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:45.667000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0170813b0 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:01:45.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:01:45.667000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:45.667000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c017032720 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:01:45.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:01:45.668000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:45.668000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c01704aab0 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:01:45.668000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:01:45.668000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:45.668000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0170813e0 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:01:45.668000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:01:45.669000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:45.669000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010d650c0 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:01:45.669000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:01:45.672000 audit[1986]: AVC avc: denied { watch } for pid=1986 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:45.672000 audit[1986]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0104770c0 a2=fc6 a3=0 items=0 ppid=1934 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c808 key=(null) Dec 13 02:01:45.672000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:01:48.197429 env[1219]: time="2024-12-13T02:01:48.197371477Z" level=info msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\"" Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.230 [WARNING][5657] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--v75ck-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee", ResourceVersion:"1311", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5", Pod:"csi-node-driver-v75ck", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicd20b7d68e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.230 [INFO][5657] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.230 [INFO][5657] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" iface="eth0" netns="" Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.230 [INFO][5657] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.230 [INFO][5657] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.248 [INFO][5666] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" HandleID="k8s-pod-network.da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.248 [INFO][5666] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.248 [INFO][5666] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.253 [WARNING][5666] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" HandleID="k8s-pod-network.da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.253 [INFO][5666] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" HandleID="k8s-pod-network.da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.254 [INFO][5666] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.257788 env[1219]: 2024-12-13 02:01:48.256 [INFO][5657] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:48.258363 env[1219]: time="2024-12-13T02:01:48.258311972Z" level=info msg="TearDown network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" successfully" Dec 13 02:01:48.258363 env[1219]: time="2024-12-13T02:01:48.258350654Z" level=info msg="StopPodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" returns successfully" Dec 13 02:01:48.259684 env[1219]: time="2024-12-13T02:01:48.259641982Z" level=info msg="RemovePodSandbox for \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\"" Dec 13 02:01:48.259747 env[1219]: time="2024-12-13T02:01:48.259680145Z" level=info msg="Forcibly stopping sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\"" Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.290 [WARNING][5690] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--v75ck-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bd5041f-f9cd-42cf-a423-3f4b7c4eecee", ResourceVersion:"1311", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2e01dccc1393cb4e41f1c03ceaabd9f24192f179ff8bfccc4b85baf234a3fea5", Pod:"csi-node-driver-v75ck", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicd20b7d68e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.291 [INFO][5690] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.291 [INFO][5690] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" iface="eth0" netns="" Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.291 [INFO][5690] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.291 [INFO][5690] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.307 [INFO][5697] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" HandleID="k8s-pod-network.da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.307 [INFO][5697] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.307 [INFO][5697] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.313 [WARNING][5697] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" HandleID="k8s-pod-network.da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.313 [INFO][5697] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" HandleID="k8s-pod-network.da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Workload="localhost-k8s-csi--node--driver--v75ck-eth0" Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.314 [INFO][5697] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.318315 env[1219]: 2024-12-13 02:01:48.316 [INFO][5690] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4" Dec 13 02:01:48.318793 env[1219]: time="2024-12-13T02:01:48.318346665Z" level=info msg="TearDown network for sandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" successfully" Dec 13 02:01:48.332206 env[1219]: time="2024-12-13T02:01:48.332155659Z" level=info msg="RemovePodSandbox \"da2311e17bf68ef203f23e746641b416485cc6a8bb90e093f4abfaa6e666ddf4\" returns successfully" Dec 13 02:01:48.332728 env[1219]: time="2024-12-13T02:01:48.332699405Z" level=info msg="StopPodSandbox for \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\"" Dec 13 02:01:48.332871 env[1219]: time="2024-12-13T02:01:48.332779877Z" level=info msg="TearDown network for sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" successfully" Dec 13 02:01:48.332871 env[1219]: time="2024-12-13T02:01:48.332816696Z" level=info msg="StopPodSandbox for \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" returns successfully" Dec 13 02:01:48.333140 env[1219]: time="2024-12-13T02:01:48.333114820Z" level=info msg="RemovePodSandbox for \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\"" Dec 13 02:01:48.333194 env[1219]: time="2024-12-13T02:01:48.333141951Z" level=info msg="Forcibly stopping sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\"" Dec 13 02:01:48.333235 env[1219]: time="2024-12-13T02:01:48.333194450Z" level=info msg="TearDown network for sandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" successfully" Dec 13 02:01:48.336767 env[1219]: time="2024-12-13T02:01:48.336701913Z" level=info msg="RemovePodSandbox \"5ae08efb2b1a7d92dcc3848e39db91298efaffa5e4913765fa54c5937dd048e3\" returns successfully" Dec 13 02:01:48.337478 env[1219]: time="2024-12-13T02:01:48.337458441Z" level=info msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\"" Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.374 [WARNING][5721] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0", ResourceVersion:"1258", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c", Pod:"coredns-7db6d8ff4d-v6gs7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d7773fbffb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.375 [INFO][5721] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.375 [INFO][5721] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" iface="eth0" netns="" Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.375 [INFO][5721] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.375 [INFO][5721] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.395 [INFO][5728] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" HandleID="k8s-pod-network.f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.397 [INFO][5728] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.397 [INFO][5728] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.401 [WARNING][5728] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" HandleID="k8s-pod-network.f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.401 [INFO][5728] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" HandleID="k8s-pod-network.f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.402 [INFO][5728] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.405289 env[1219]: 2024-12-13 02:01:48.403 [INFO][5721] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:48.405749 env[1219]: time="2024-12-13T02:01:48.405312810Z" level=info msg="TearDown network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" successfully" Dec 13 02:01:48.405749 env[1219]: time="2024-12-13T02:01:48.405346453Z" level=info msg="StopPodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" returns successfully" Dec 13 02:01:48.405898 env[1219]: time="2024-12-13T02:01:48.405863359Z" level=info msg="RemovePodSandbox for \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\"" Dec 13 02:01:48.405976 env[1219]: time="2024-12-13T02:01:48.405902282Z" level=info msg="Forcibly stopping sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\"" Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.433 [WARNING][5750] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0a6f3aa8-8f0c-4a2b-8f0f-8da01da1bfe0", ResourceVersion:"1258", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1d48ea873d376ff69e1691a9df56c4e28afd51f694c63e8b676f935a6726809c", Pod:"coredns-7db6d8ff4d-v6gs7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d7773fbffb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.433 [INFO][5750] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.433 [INFO][5750] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" iface="eth0" netns="" Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.433 [INFO][5750] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.433 [INFO][5750] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.449 [INFO][5758] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" HandleID="k8s-pod-network.f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.450 [INFO][5758] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.450 [INFO][5758] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.454 [WARNING][5758] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" HandleID="k8s-pod-network.f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.454 [INFO][5758] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" HandleID="k8s-pod-network.f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Workload="localhost-k8s-coredns--7db6d8ff4d--v6gs7-eth0" Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.455 [INFO][5758] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.458252 env[1219]: 2024-12-13 02:01:48.456 [INFO][5750] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03" Dec 13 02:01:48.458252 env[1219]: time="2024-12-13T02:01:48.458219165Z" level=info msg="TearDown network for sandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" successfully" Dec 13 02:01:48.461502 env[1219]: time="2024-12-13T02:01:48.461472206Z" level=info msg="RemovePodSandbox \"f68cb6f146c1779f1a2e374773ce3e508a82593feed32b0f2558721198aa3c03\" returns successfully" Dec 13 02:01:48.461928 env[1219]: time="2024-12-13T02:01:48.461881249Z" level=info msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\"" Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.489 [WARNING][5781] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0", GenerateName:"calico-apiserver-6f6b995bdd-", Namespace:"calico-apiserver", SelfLink:"", UID:"84cc8599-b8a8-43d2-8b5c-5a022da5fb55", ResourceVersion:"1213", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6b995bdd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202", Pod:"calico-apiserver-6f6b995bdd-4fxb8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4d70402492b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.489 [INFO][5781] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.489 [INFO][5781] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" iface="eth0" netns="" Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.489 [INFO][5781] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.489 [INFO][5781] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.506 [INFO][5788] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" HandleID="k8s-pod-network.afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.506 [INFO][5788] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.506 [INFO][5788] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.511 [WARNING][5788] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" HandleID="k8s-pod-network.afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.511 [INFO][5788] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" HandleID="k8s-pod-network.afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.512 [INFO][5788] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.514903 env[1219]: 2024-12-13 02:01:48.513 [INFO][5781] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:48.515631 env[1219]: time="2024-12-13T02:01:48.514920985Z" level=info msg="TearDown network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" successfully" Dec 13 02:01:48.515631 env[1219]: time="2024-12-13T02:01:48.514962143Z" level=info msg="StopPodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" returns successfully" Dec 13 02:01:48.515631 env[1219]: time="2024-12-13T02:01:48.515370764Z" level=info msg="RemovePodSandbox for \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\"" Dec 13 02:01:48.515631 env[1219]: time="2024-12-13T02:01:48.515405129Z" level=info msg="Forcibly stopping sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\"" Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.543 [WARNING][5810] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0", GenerateName:"calico-apiserver-6f6b995bdd-", Namespace:"calico-apiserver", SelfLink:"", UID:"84cc8599-b8a8-43d2-8b5c-5a022da5fb55", ResourceVersion:"1213", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6b995bdd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"22cfd2667cef54236d599178d74c0d8ce9462e8ac0e4e5434aaceb4e29afd202", Pod:"calico-apiserver-6f6b995bdd-4fxb8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4d70402492b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.543 [INFO][5810] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.544 [INFO][5810] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" iface="eth0" netns="" Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.544 [INFO][5810] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.544 [INFO][5810] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.559 [INFO][5818] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" HandleID="k8s-pod-network.afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.559 [INFO][5818] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.559 [INFO][5818] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.564 [WARNING][5818] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" HandleID="k8s-pod-network.afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.565 [INFO][5818] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" HandleID="k8s-pod-network.afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--4fxb8-eth0" Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.565 [INFO][5818] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.568968 env[1219]: 2024-12-13 02:01:48.567 [INFO][5810] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38" Dec 13 02:01:48.569604 env[1219]: time="2024-12-13T02:01:48.568996848Z" level=info msg="TearDown network for sandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" successfully" Dec 13 02:01:48.572080 env[1219]: time="2024-12-13T02:01:48.572051185Z" level=info msg="RemovePodSandbox \"afe8fe572d49ac18b9af5224108b014a61751ec18329d110d8e15d365f51ce38\" returns successfully" Dec 13 02:01:48.572493 env[1219]: time="2024-12-13T02:01:48.572461600Z" level=info msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\"" Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.600 [WARNING][5840] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0", GenerateName:"calico-kube-controllers-5bd74ff756-", Namespace:"calico-system", SelfLink:"", UID:"1184bdee-ddbd-4572-9358-2e64b0d4fb76", ResourceVersion:"1313", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bd74ff756", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6", Pod:"calico-kube-controllers-5bd74ff756-ts7cv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali20a9ddb9fea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.600 [INFO][5840] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.600 [INFO][5840] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" iface="eth0" netns="" Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.600 [INFO][5840] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.600 [INFO][5840] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.617 [INFO][5847] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" HandleID="k8s-pod-network.e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.617 [INFO][5847] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.617 [INFO][5847] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.621 [WARNING][5847] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" HandleID="k8s-pod-network.e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.621 [INFO][5847] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" HandleID="k8s-pod-network.e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.622 [INFO][5847] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.625402 env[1219]: 2024-12-13 02:01:48.623 [INFO][5840] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:48.625880 env[1219]: time="2024-12-13T02:01:48.625417658Z" level=info msg="TearDown network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" successfully" Dec 13 02:01:48.625880 env[1219]: time="2024-12-13T02:01:48.625447494Z" level=info msg="StopPodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" returns successfully" Dec 13 02:01:48.626603 env[1219]: time="2024-12-13T02:01:48.626565816Z" level=info msg="RemovePodSandbox for \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\"" Dec 13 02:01:48.626756 env[1219]: time="2024-12-13T02:01:48.626602335Z" level=info msg="Forcibly stopping sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\"" Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.653 [WARNING][5869] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0", GenerateName:"calico-kube-controllers-5bd74ff756-", Namespace:"calico-system", SelfLink:"", UID:"1184bdee-ddbd-4572-9358-2e64b0d4fb76", ResourceVersion:"1313", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bd74ff756", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"79682b77379b504be27efbe027b2c4770b69fc7a61501359a6669e4f3a52dbd6", Pod:"calico-kube-controllers-5bd74ff756-ts7cv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali20a9ddb9fea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.653 [INFO][5869] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.653 [INFO][5869] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" iface="eth0" netns="" Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.653 [INFO][5869] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.653 [INFO][5869] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.670 [INFO][5876] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" HandleID="k8s-pod-network.e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.670 [INFO][5876] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.670 [INFO][5876] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.674 [WARNING][5876] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" HandleID="k8s-pod-network.e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.674 [INFO][5876] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" HandleID="k8s-pod-network.e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Workload="localhost-k8s-calico--kube--controllers--5bd74ff756--ts7cv-eth0" Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.675 [INFO][5876] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.678084 env[1219]: 2024-12-13 02:01:48.676 [INFO][5869] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00" Dec 13 02:01:48.678539 env[1219]: time="2024-12-13T02:01:48.678104709Z" level=info msg="TearDown network for sandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" successfully" Dec 13 02:01:48.681178 env[1219]: time="2024-12-13T02:01:48.681149218Z" level=info msg="RemovePodSandbox \"e83b10f5b6039a8abf9efb7d209edcfe094a17fc690d0962b65e9aa521229e00\" returns successfully" Dec 13 02:01:48.681546 env[1219]: time="2024-12-13T02:01:48.681522141Z" level=info msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\"" Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.709 [WARNING][5898] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"88080b51-d429-4316-8cdf-3f4303a92112", ResourceVersion:"1281", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5", Pod:"coredns-7db6d8ff4d-4qj2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64ef43fe0b0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.709 [INFO][5898] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.709 [INFO][5898] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" iface="eth0" netns="" Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.709 [INFO][5898] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.709 [INFO][5898] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.726 [INFO][5906] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" HandleID="k8s-pod-network.091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.726 [INFO][5906] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.726 [INFO][5906] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.731 [WARNING][5906] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" HandleID="k8s-pod-network.091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.731 [INFO][5906] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" HandleID="k8s-pod-network.091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.732 [INFO][5906] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.735170 env[1219]: 2024-12-13 02:01:48.733 [INFO][5898] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:48.735170 env[1219]: time="2024-12-13T02:01:48.735124701Z" level=info msg="TearDown network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" successfully" Dec 13 02:01:48.735170 env[1219]: time="2024-12-13T02:01:48.735155629Z" level=info msg="StopPodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" returns successfully" Dec 13 02:01:48.735654 env[1219]: time="2024-12-13T02:01:48.735626298Z" level=info msg="RemovePodSandbox for \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\"" Dec 13 02:01:48.735782 env[1219]: time="2024-12-13T02:01:48.735710677Z" level=info msg="Forcibly stopping sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\"" Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.765 [WARNING][5929] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"88080b51-d429-4316-8cdf-3f4303a92112", ResourceVersion:"1281", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9ee4bc7ca134ca4b598a8affd348efbdb2aea4fcf7c71e248d8571b2698c82d5", Pod:"coredns-7db6d8ff4d-4qj2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64ef43fe0b0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.765 [INFO][5929] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.765 [INFO][5929] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" iface="eth0" netns="" Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.765 [INFO][5929] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.765 [INFO][5929] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.784 [INFO][5937] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" HandleID="k8s-pod-network.091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.785 [INFO][5937] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.785 [INFO][5937] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.789 [WARNING][5937] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" HandleID="k8s-pod-network.091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.789 [INFO][5937] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" HandleID="k8s-pod-network.091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Workload="localhost-k8s-coredns--7db6d8ff4d--4qj2w-eth0" Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.790 [INFO][5937] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.793235 env[1219]: 2024-12-13 02:01:48.791 [INFO][5929] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea" Dec 13 02:01:48.793692 env[1219]: time="2024-12-13T02:01:48.793262043Z" level=info msg="TearDown network for sandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" successfully" Dec 13 02:01:48.796436 env[1219]: time="2024-12-13T02:01:48.796416779Z" level=info msg="RemovePodSandbox \"091b4328e0473ffc899ce005614fec06c34b5a14db79de3566c287cac420fbea\" returns successfully" Dec 13 02:01:48.796954 env[1219]: time="2024-12-13T02:01:48.796905231Z" level=info msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\"" Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.824 [WARNING][5959] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0", GenerateName:"calico-apiserver-6f6b995bdd-", Namespace:"calico-apiserver", SelfLink:"", UID:"29d76287-050b-45b1-afc1-918e6f3fd86b", ResourceVersion:"1165", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6b995bdd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83", Pod:"calico-apiserver-6f6b995bdd-46kpn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid87a4eee2b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.824 [INFO][5959] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.824 [INFO][5959] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" iface="eth0" netns="" Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.825 [INFO][5959] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.825 [INFO][5959] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.842 [INFO][5966] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" HandleID="k8s-pod-network.3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.842 [INFO][5966] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.842 [INFO][5966] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.846 [WARNING][5966] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" HandleID="k8s-pod-network.3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.846 [INFO][5966] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" HandleID="k8s-pod-network.3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.847 [INFO][5966] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.850579 env[1219]: 2024-12-13 02:01:48.849 [INFO][5959] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:48.851194 env[1219]: time="2024-12-13T02:01:48.850646171Z" level=info msg="TearDown network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\" successfully" Dec 13 02:01:48.851194 env[1219]: time="2024-12-13T02:01:48.850678312Z" level=info msg="StopPodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\" returns successfully" Dec 13 02:01:48.851194 env[1219]: time="2024-12-13T02:01:48.851163989Z" level=info msg="RemovePodSandbox for \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\"" Dec 13 02:01:48.851265 env[1219]: time="2024-12-13T02:01:48.851201320Z" level=info msg="Forcibly stopping sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\"" Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.881 [WARNING][5988] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0", GenerateName:"calico-apiserver-6f6b995bdd-", Namespace:"calico-apiserver", SelfLink:"", UID:"29d76287-050b-45b1-afc1-918e6f3fd86b", ResourceVersion:"1165", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6b995bdd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff6949df9daeb3e934f49e4ea2249ca2a424cd145ad9a7e7fe887da4f29b5e83", Pod:"calico-apiserver-6f6b995bdd-46kpn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid87a4eee2b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.881 [INFO][5988] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.881 [INFO][5988] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" iface="eth0" netns="" Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.881 [INFO][5988] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.881 [INFO][5988] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.899 [INFO][5996] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" HandleID="k8s-pod-network.3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.899 [INFO][5996] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.899 [INFO][5996] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.904 [WARNING][5996] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" HandleID="k8s-pod-network.3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.904 [INFO][5996] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" HandleID="k8s-pod-network.3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Workload="localhost-k8s-calico--apiserver--6f6b995bdd--46kpn-eth0" Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.905 [INFO][5996] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:01:48.908301 env[1219]: 2024-12-13 02:01:48.906 [INFO][5988] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9" Dec 13 02:01:48.908854 env[1219]: time="2024-12-13T02:01:48.908313365Z" level=info msg="TearDown network for sandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\" successfully" Dec 13 02:01:48.911289 env[1219]: time="2024-12-13T02:01:48.911258666Z" level=info msg="RemovePodSandbox \"3c1f546e1723a653d170fdd2ed4299e8109b73a3798c59cf2c4bbdc3325064a9\" returns successfully" Dec 13 02:01:49.804229 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 02:01:49.804347 kernel: audit: type=1130 audit(1734055309.799:1628): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.133:22-10.0.0.1:59166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:49.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.133:22-10.0.0.1:59166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:49.800112 systemd[1]: Started sshd@30-10.0.0.133:22-10.0.0.1:59166.service. Dec 13 02:01:49.840000 audit[6026]: USER_ACCT pid=6026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:49.841475 sshd[6026]: Accepted publickey for core from 10.0.0.1 port 59166 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:49.843605 sshd[6026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:49.842000 audit[6026]: CRED_ACQ pid=6026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:49.847205 systemd-logind[1206]: New session 31 of user core. Dec 13 02:01:49.847956 systemd[1]: Started session-31.scope. Dec 13 02:01:49.849179 kernel: audit: type=1101 audit(1734055309.840:1629): pid=6026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:49.849237 kernel: audit: type=1103 audit(1734055309.842:1630): pid=6026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:49.849410 kernel: audit: type=1006 audit(1734055309.842:1631): pid=6026 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Dec 13 02:01:49.855619 kernel: audit: type=1300 audit(1734055309.842:1631): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff97242680 a2=3 a3=0 items=0 ppid=1 pid=6026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:49.842000 audit[6026]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff97242680 a2=3 a3=0 items=0 ppid=1 pid=6026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:49.857322 kernel: audit: type=1327 audit(1734055309.842:1631): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:49.857370 kernel: audit: type=1105 audit(1734055309.853:1632): pid=6026 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:49.842000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:49.853000 audit[6026]: USER_START pid=6026 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:49.861576 kernel: audit: type=1103 audit(1734055309.854:1633): pid=6028 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:49.854000 audit[6028]: CRED_ACQ pid=6028 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:50.042343 sshd[6026]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:50.042000 audit[6026]: USER_END pid=6026 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:50.044791 systemd[1]: sshd@30-10.0.0.133:22-10.0.0.1:59166.service: Deactivated successfully. Dec 13 02:01:50.045493 systemd[1]: session-31.scope: Deactivated successfully. Dec 13 02:01:50.046043 systemd-logind[1206]: Session 31 logged out. Waiting for processes to exit. Dec 13 02:01:50.046818 systemd-logind[1206]: Removed session 31. Dec 13 02:01:50.042000 audit[6026]: CRED_DISP pid=6026 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:50.051197 kernel: audit: type=1106 audit(1734055310.042:1634): pid=6026 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:50.051268 kernel: audit: type=1104 audit(1734055310.042:1635): pid=6026 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:50.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.133:22-10.0.0.1:59166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:53.197220 kubelet[2076]: E1213 02:01:53.197179 2076 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:55.046165 systemd[1]: Started sshd@31-10.0.0.133:22-10.0.0.1:59174.service. Dec 13 02:01:55.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.133:22-10.0.0.1:59174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:55.047486 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:01:55.047527 kernel: audit: type=1130 audit(1734055315.045:1637): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.133:22-10.0.0.1:59174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:55.076000 audit[6039]: USER_ACCT pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.078087 sshd[6039]: Accepted publickey for core from 10.0.0.1 port 59174 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:01:55.081000 audit[6039]: CRED_ACQ pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.082688 sshd[6039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:55.086404 kernel: audit: type=1101 audit(1734055315.076:1638): pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.086450 kernel: audit: type=1103 audit(1734055315.081:1639): pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.085890 systemd-logind[1206]: New session 32 of user core. Dec 13 02:01:55.086810 systemd[1]: Started session-32.scope. Dec 13 02:01:55.089126 kernel: audit: type=1006 audit(1734055315.081:1640): pid=6039 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Dec 13 02:01:55.081000 audit[6039]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9bc5ed50 a2=3 a3=0 items=0 ppid=1 pid=6039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.093644 kernel: audit: type=1300 audit(1734055315.081:1640): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9bc5ed50 a2=3 a3=0 items=0 ppid=1 pid=6039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:55.081000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:55.095329 kernel: audit: type=1327 audit(1734055315.081:1640): proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:55.095919 kernel: audit: type=1105 audit(1734055315.089:1641): pid=6039 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.089000 audit[6039]: USER_START pid=6039 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.100245 kernel: audit: type=1103 audit(1734055315.091:1642): pid=6041 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.091000 audit[6041]: CRED_ACQ pid=6041 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.191919 sshd[6039]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:55.192000 audit[6039]: USER_END pid=6039 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.194511 systemd[1]: sshd@31-10.0.0.133:22-10.0.0.1:59174.service: Deactivated successfully. Dec 13 02:01:55.195225 systemd[1]: session-32.scope: Deactivated successfully. Dec 13 02:01:55.195699 systemd-logind[1206]: Session 32 logged out. Waiting for processes to exit. Dec 13 02:01:55.196500 systemd-logind[1206]: Removed session 32. Dec 13 02:01:55.197988 kernel: audit: type=1106 audit(1734055315.192:1643): pid=6039 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.198044 kernel: audit: type=1104 audit(1734055315.192:1644): pid=6039 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.192000 audit[6039]: CRED_DISP pid=6039 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:55.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.133:22-10.0.0.1:59174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:59.965000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:59.965000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:59.965000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:59.965000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e202a0 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:01:59.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:59.965000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e94360 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:01:59.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:59.965000 audit[1856]: AVC avc: denied { watch } for pid=1856 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:59.965000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c002bbea20 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:01:59.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:59.965000 audit[1856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000c1f9a0 a2=fc6 a3=0 items=0 ppid=1762 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c285,c995 key=(null) Dec 13 02:01:59.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:02:00.195626 systemd[1]: Started sshd@32-10.0.0.133:22-10.0.0.1:51404.service. Dec 13 02:02:00.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.133:22-10.0.0.1:51404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:00.196606 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 02:02:00.196664 kernel: audit: type=1130 audit(1734055320.194:1650): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.133:22-10.0.0.1:51404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:00.226000 audit[6059]: USER_ACCT pid=6059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.227438 sshd[6059]: Accepted publickey for core from 10.0.0.1 port 51404 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 02:02:00.229459 sshd[6059]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:00.228000 audit[6059]: CRED_ACQ pid=6059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.233408 systemd-logind[1206]: New session 33 of user core. Dec 13 02:02:00.233777 systemd[1]: Started session-33.scope. Dec 13 02:02:00.235031 kernel: audit: type=1101 audit(1734055320.226:1651): pid=6059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.235253 kernel: audit: type=1103 audit(1734055320.228:1652): pid=6059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.235303 kernel: audit: type=1006 audit(1734055320.228:1653): pid=6059 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Dec 13 02:02:00.228000 audit[6059]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8bdf3880 a2=3 a3=0 items=0 ppid=1 pid=6059 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:00.241311 kernel: audit: type=1300 audit(1734055320.228:1653): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8bdf3880 a2=3 a3=0 items=0 ppid=1 pid=6059 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:00.241377 kernel: audit: type=1327 audit(1734055320.228:1653): proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:00.228000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:00.237000 audit[6059]: USER_START pid=6059 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.246855 kernel: audit: type=1105 audit(1734055320.237:1654): pid=6059 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.246900 kernel: audit: type=1103 audit(1734055320.238:1655): pid=6061 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.238000 audit[6061]: CRED_ACQ pid=6061 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.440321 sshd[6059]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:00.440000 audit[6059]: USER_END pid=6059 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.443084 systemd[1]: sshd@32-10.0.0.133:22-10.0.0.1:51404.service: Deactivated successfully. Dec 13 02:02:00.443782 systemd[1]: session-33.scope: Deactivated successfully. Dec 13 02:02:00.444341 systemd-logind[1206]: Session 33 logged out. Waiting for processes to exit. Dec 13 02:02:00.445068 systemd-logind[1206]: Removed session 33. Dec 13 02:02:00.440000 audit[6059]: CRED_DISP pid=6059 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.449501 kernel: audit: type=1106 audit(1734055320.440:1656): pid=6059 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.449565 kernel: audit: type=1104 audit(1734055320.440:1657): pid=6059 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:00.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.133:22-10.0.0.1:51404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'