Dec 13 01:54:21.826266 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 01:54:21.826285 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:54:21.826295 kernel: BIOS-provided physical RAM map: Dec 13 01:54:21.826301 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:54:21.826306 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:54:21.826312 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:54:21.826319 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:54:21.826324 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:54:21.826330 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:54:21.826337 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:54:21.826342 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 01:54:21.826348 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:54:21.826353 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:54:21.826359 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:54:21.826366 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:54:21.826373 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:54:21.826379 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:54:21.826385 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:54:21.826391 kernel: NX (Execute Disable) protection: active Dec 13 01:54:21.826397 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:54:21.826403 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 01:54:21.826409 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:54:21.826414 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 01:54:21.826420 kernel: extended physical RAM map: Dec 13 01:54:21.826426 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:54:21.826434 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 01:54:21.826440 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 01:54:21.826446 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 01:54:21.826452 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 01:54:21.826458 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 01:54:21.826464 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 01:54:21.826469 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 01:54:21.826475 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 01:54:21.826481 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 01:54:21.826487 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 01:54:21.826493 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 01:54:21.826500 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 01:54:21.826506 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 01:54:21.826512 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 01:54:21.826518 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 01:54:21.826527 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 01:54:21.826533 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 01:54:21.826539 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 01:54:21.826547 kernel: efi: EFI v2.70 by EDK II Dec 13 01:54:21.826553 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 01:54:21.826560 kernel: random: crng init done Dec 13 01:54:21.826566 kernel: SMBIOS 2.8 present. Dec 13 01:54:21.826573 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 01:54:21.826579 kernel: Hypervisor detected: KVM Dec 13 01:54:21.826585 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 01:54:21.826592 kernel: kvm-clock: cpu 0, msr 1619b001, primary cpu clock Dec 13 01:54:21.826598 kernel: kvm-clock: using sched offset of 4163470510 cycles Dec 13 01:54:21.826617 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 01:54:21.826624 kernel: tsc: Detected 2794.748 MHz processor Dec 13 01:54:21.826630 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 01:54:21.826637 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 01:54:21.826644 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 01:54:21.826650 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 01:54:21.826657 kernel: Using GB pages for direct mapping Dec 13 01:54:21.826663 kernel: Secure boot disabled Dec 13 01:54:21.826670 kernel: ACPI: Early table checksum verification disabled Dec 13 01:54:21.826678 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 01:54:21.826685 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 01:54:21.826691 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:54:21.826698 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:54:21.826704 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 01:54:21.826711 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:54:21.826717 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:54:21.826724 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:54:21.826732 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 01:54:21.826740 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 01:54:21.826746 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 01:54:21.826753 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 01:54:21.826759 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 01:54:21.826766 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 01:54:21.826772 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 01:54:21.826779 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 01:54:21.826785 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 01:54:21.826791 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 01:54:21.826799 kernel: No NUMA configuration found Dec 13 01:54:21.826816 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 01:54:21.826822 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 01:54:21.826829 kernel: Zone ranges: Dec 13 01:54:21.826835 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 01:54:21.826842 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 01:54:21.826848 kernel: Normal empty Dec 13 01:54:21.826855 kernel: Movable zone start for each node Dec 13 01:54:21.826861 kernel: Early memory node ranges Dec 13 01:54:21.826870 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 01:54:21.826876 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 01:54:21.826883 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 01:54:21.826889 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 01:54:21.826895 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 01:54:21.826902 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 01:54:21.826908 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 01:54:21.826915 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:54:21.826921 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 01:54:21.826928 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 01:54:21.826935 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:54:21.826942 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 01:54:21.826948 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 01:54:21.826955 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 01:54:21.826962 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 01:54:21.826968 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 01:54:21.826975 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 01:54:21.826981 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 01:54:21.826988 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 01:54:21.826995 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 01:54:21.827002 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 01:54:21.827008 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 01:54:21.827015 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 01:54:21.827022 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 01:54:21.827028 kernel: TSC deadline timer available Dec 13 01:54:21.827035 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 01:54:21.827041 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 01:54:21.827048 kernel: kvm-guest: setup PV sched yield Dec 13 01:54:21.827055 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 01:54:21.827062 kernel: Booting paravirtualized kernel on KVM Dec 13 01:54:21.827073 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 01:54:21.827081 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 01:54:21.827087 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 01:54:21.827094 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 01:54:21.827101 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 01:54:21.827107 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 01:54:21.827114 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 01:54:21.827121 kernel: kvm-guest: PV spinlocks enabled Dec 13 01:54:21.827128 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 01:54:21.827135 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 01:54:21.827143 kernel: Policy zone: DMA32 Dec 13 01:54:21.827151 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:54:21.827159 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 01:54:21.827165 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 01:54:21.827173 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 01:54:21.827180 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 01:54:21.827188 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 169308K reserved, 0K cma-reserved) Dec 13 01:54:21.827195 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 01:54:21.827202 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 01:54:21.827208 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 01:54:21.827215 kernel: rcu: Hierarchical RCU implementation. Dec 13 01:54:21.827223 kernel: rcu: RCU event tracing is enabled. Dec 13 01:54:21.827230 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 01:54:21.827238 kernel: Rude variant of Tasks RCU enabled. Dec 13 01:54:21.827245 kernel: Tracing variant of Tasks RCU enabled. Dec 13 01:54:21.827252 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 01:54:21.827259 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 01:54:21.827266 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 01:54:21.827272 kernel: Console: colour dummy device 80x25 Dec 13 01:54:21.827279 kernel: printk: console [ttyS0] enabled Dec 13 01:54:21.827286 kernel: ACPI: Core revision 20210730 Dec 13 01:54:21.827293 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 01:54:21.827301 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 01:54:21.827308 kernel: x2apic enabled Dec 13 01:54:21.827315 kernel: Switched APIC routing to physical x2apic. Dec 13 01:54:21.827322 kernel: kvm-guest: setup PV IPIs Dec 13 01:54:21.827329 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 01:54:21.827335 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 01:54:21.827342 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 01:54:21.827349 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 01:54:21.827356 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 01:54:21.827364 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 01:54:21.827371 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 01:54:21.827378 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 01:54:21.827385 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 01:54:21.827392 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 01:54:21.827399 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 01:54:21.827405 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 01:54:21.827413 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 01:54:21.827420 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 01:54:21.827428 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 01:54:21.827435 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 01:54:21.827442 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 01:54:21.827449 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 01:54:21.827456 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 01:54:21.827463 kernel: Freeing SMP alternatives memory: 32K Dec 13 01:54:21.827469 kernel: pid_max: default: 32768 minimum: 301 Dec 13 01:54:21.827476 kernel: LSM: Security Framework initializing Dec 13 01:54:21.827483 kernel: SELinux: Initializing. Dec 13 01:54:21.827492 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:54:21.827499 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 01:54:21.827505 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 01:54:21.827512 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 01:54:21.827519 kernel: ... version: 0 Dec 13 01:54:21.827526 kernel: ... bit width: 48 Dec 13 01:54:21.827533 kernel: ... generic registers: 6 Dec 13 01:54:21.827540 kernel: ... value mask: 0000ffffffffffff Dec 13 01:54:21.827546 kernel: ... max period: 00007fffffffffff Dec 13 01:54:21.827554 kernel: ... fixed-purpose events: 0 Dec 13 01:54:21.827561 kernel: ... event mask: 000000000000003f Dec 13 01:54:21.827568 kernel: signal: max sigframe size: 1776 Dec 13 01:54:21.827575 kernel: rcu: Hierarchical SRCU implementation. Dec 13 01:54:21.827582 kernel: smp: Bringing up secondary CPUs ... Dec 13 01:54:21.827589 kernel: x86: Booting SMP configuration: Dec 13 01:54:21.827596 kernel: .... node #0, CPUs: #1 Dec 13 01:54:21.827609 kernel: kvm-clock: cpu 1, msr 1619b041, secondary cpu clock Dec 13 01:54:21.827616 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 01:54:21.827624 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 01:54:21.827631 kernel: #2 Dec 13 01:54:21.827638 kernel: kvm-clock: cpu 2, msr 1619b081, secondary cpu clock Dec 13 01:54:21.827645 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 01:54:21.827655 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 01:54:21.827662 kernel: #3 Dec 13 01:54:21.827671 kernel: kvm-clock: cpu 3, msr 1619b0c1, secondary cpu clock Dec 13 01:54:21.827678 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 01:54:21.827687 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 01:54:21.827694 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 01:54:21.827702 kernel: smpboot: Max logical packages: 1 Dec 13 01:54:21.827709 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 01:54:21.827716 kernel: devtmpfs: initialized Dec 13 01:54:21.827722 kernel: x86/mm: Memory block size: 128MB Dec 13 01:54:21.827729 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 01:54:21.827736 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 01:54:21.827743 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 01:54:21.827750 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 01:54:21.827757 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 01:54:21.827765 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 01:54:21.827772 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 01:54:21.827779 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 01:54:21.827786 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 01:54:21.827793 kernel: audit: initializing netlink subsys (disabled) Dec 13 01:54:21.827799 kernel: audit: type=2000 audit(1734054862.223:1): state=initialized audit_enabled=0 res=1 Dec 13 01:54:21.827815 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 01:54:21.827822 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 01:54:21.827830 kernel: cpuidle: using governor menu Dec 13 01:54:21.827837 kernel: ACPI: bus type PCI registered Dec 13 01:54:21.827844 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 01:54:21.827850 kernel: dca service started, version 1.12.1 Dec 13 01:54:21.827857 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 01:54:21.827864 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 01:54:21.827871 kernel: PCI: Using configuration type 1 for base access Dec 13 01:54:21.827878 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 01:54:21.827885 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 01:54:21.827893 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 01:54:21.827900 kernel: ACPI: Added _OSI(Module Device) Dec 13 01:54:21.827907 kernel: ACPI: Added _OSI(Processor Device) Dec 13 01:54:21.827914 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 01:54:21.827921 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 01:54:21.827928 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 01:54:21.827935 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 01:54:21.827941 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 01:54:21.827948 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 01:54:21.827955 kernel: ACPI: Interpreter enabled Dec 13 01:54:21.827963 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 01:54:21.827970 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 01:54:21.827977 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 01:54:21.827984 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 01:54:21.827991 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 01:54:21.828102 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 01:54:21.828177 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 01:54:21.828247 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 01:54:21.828257 kernel: PCI host bridge to bus 0000:00 Dec 13 01:54:21.828330 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 01:54:21.828393 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 01:54:21.828454 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 01:54:21.828515 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 01:54:21.828575 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 01:54:21.828647 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 01:54:21.828710 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 01:54:21.828791 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 01:54:21.828884 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 01:54:21.828953 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 01:54:21.829021 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 01:54:21.829090 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 01:54:21.829162 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 01:54:21.829231 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 01:54:21.829312 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 01:54:21.829386 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 01:54:21.829456 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 01:54:21.829524 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 01:54:21.829611 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 01:54:21.830315 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 01:54:21.830390 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 01:54:21.830458 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 01:54:21.830532 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 01:54:21.830611 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 01:54:21.830682 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 01:54:21.830753 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 01:54:21.830847 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 01:54:21.830925 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 01:54:21.830994 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 01:54:21.831068 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 01:54:21.831137 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 01:54:21.831204 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 01:54:21.831281 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 01:54:21.831356 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 01:54:21.831367 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 01:54:21.831374 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 01:54:21.831381 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 01:54:21.831388 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 01:54:21.831396 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 01:54:21.831403 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 01:54:21.831412 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 01:54:21.831419 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 01:54:21.831426 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 01:54:21.831433 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 01:54:21.831440 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 01:54:21.831447 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 01:54:21.831454 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 01:54:21.831460 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 01:54:21.831467 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 01:54:21.831475 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 01:54:21.831482 kernel: iommu: Default domain type: Translated Dec 13 01:54:21.831489 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 01:54:21.831558 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 01:54:21.831639 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 01:54:21.831708 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 01:54:21.831718 kernel: vgaarb: loaded Dec 13 01:54:21.831725 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 01:54:21.831732 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 01:54:21.831742 kernel: PTP clock support registered Dec 13 01:54:21.831749 kernel: Registered efivars operations Dec 13 01:54:21.831756 kernel: PCI: Using ACPI for IRQ routing Dec 13 01:54:21.831763 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 01:54:21.831770 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 01:54:21.831777 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 01:54:21.831784 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 01:54:21.831790 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 01:54:21.831797 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 01:54:21.831816 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 01:54:21.831823 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 01:54:21.831830 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 01:54:21.831837 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 01:54:21.831844 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 01:54:21.831851 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 01:54:21.831858 kernel: pnp: PnP ACPI init Dec 13 01:54:21.831934 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 01:54:21.831947 kernel: pnp: PnP ACPI: found 6 devices Dec 13 01:54:21.831954 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 01:54:21.831961 kernel: NET: Registered PF_INET protocol family Dec 13 01:54:21.831968 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 01:54:21.831976 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 01:54:21.831983 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 01:54:21.831990 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 01:54:21.831997 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 01:54:21.832005 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 01:54:21.832012 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:54:21.832019 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 01:54:21.832026 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 01:54:21.832033 kernel: NET: Registered PF_XDP protocol family Dec 13 01:54:21.832102 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 01:54:21.832169 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 01:54:21.832232 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 01:54:21.832294 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 01:54:21.832355 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 01:54:21.832414 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 01:54:21.832472 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 01:54:21.832532 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 01:54:21.832541 kernel: PCI: CLS 0 bytes, default 64 Dec 13 01:54:21.832548 kernel: Initialise system trusted keyrings Dec 13 01:54:21.832555 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 01:54:21.832562 kernel: Key type asymmetric registered Dec 13 01:54:21.832571 kernel: Asymmetric key parser 'x509' registered Dec 13 01:54:21.832578 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 01:54:21.832593 kernel: io scheduler mq-deadline registered Dec 13 01:54:21.832611 kernel: io scheduler kyber registered Dec 13 01:54:21.832618 kernel: io scheduler bfq registered Dec 13 01:54:21.832626 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 01:54:21.832633 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 01:54:21.832641 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 01:54:21.832648 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 01:54:21.832656 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 01:54:21.832664 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 01:54:21.832671 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 01:54:21.832678 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 01:54:21.832686 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 01:54:21.832768 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 01:54:21.832779 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 01:54:21.832854 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 01:54:21.832920 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T01:54:21 UTC (1734054861) Dec 13 01:54:21.834941 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 01:54:21.834987 kernel: efifb: probing for efifb Dec 13 01:54:21.834998 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 01:54:21.835009 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 01:54:21.835020 kernel: efifb: scrolling: redraw Dec 13 01:54:21.835031 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 01:54:21.835042 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 01:54:21.835052 kernel: fb0: EFI VGA frame buffer device Dec 13 01:54:21.835069 kernel: pstore: Registered efi as persistent store backend Dec 13 01:54:21.835078 kernel: NET: Registered PF_INET6 protocol family Dec 13 01:54:21.835089 kernel: Segment Routing with IPv6 Dec 13 01:54:21.835101 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 01:54:21.835111 kernel: NET: Registered PF_PACKET protocol family Dec 13 01:54:21.835122 kernel: Key type dns_resolver registered Dec 13 01:54:21.835134 kernel: IPI shorthand broadcast: enabled Dec 13 01:54:21.835146 kernel: sched_clock: Marking stable (420019786, 127994584)->(591890087, -43875717) Dec 13 01:54:21.835157 kernel: registered taskstats version 1 Dec 13 01:54:21.835167 kernel: Loading compiled-in X.509 certificates Dec 13 01:54:21.835178 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 01:54:21.835189 kernel: Key type .fscrypt registered Dec 13 01:54:21.835199 kernel: Key type fscrypt-provisioning registered Dec 13 01:54:21.835209 kernel: pstore: Using crash dump compression: deflate Dec 13 01:54:21.835222 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 01:54:21.835232 kernel: ima: Allocated hash algorithm: sha1 Dec 13 01:54:21.835242 kernel: ima: No architecture policies found Dec 13 01:54:21.835253 kernel: clk: Disabling unused clocks Dec 13 01:54:21.835264 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 01:54:21.835274 kernel: Write protecting the kernel read-only data: 28672k Dec 13 01:54:21.835284 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 01:54:21.835295 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 01:54:21.835305 kernel: Run /init as init process Dec 13 01:54:21.835317 kernel: with arguments: Dec 13 01:54:21.835328 kernel: /init Dec 13 01:54:21.835338 kernel: with environment: Dec 13 01:54:21.835348 kernel: HOME=/ Dec 13 01:54:21.835359 kernel: TERM=linux Dec 13 01:54:21.835369 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 01:54:21.835383 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:54:21.835398 systemd[1]: Detected virtualization kvm. Dec 13 01:54:21.835410 systemd[1]: Detected architecture x86-64. Dec 13 01:54:21.835422 systemd[1]: Running in initrd. Dec 13 01:54:21.835433 systemd[1]: No hostname configured, using default hostname. Dec 13 01:54:21.835443 systemd[1]: Hostname set to . Dec 13 01:54:21.835454 systemd[1]: Initializing machine ID from VM UUID. Dec 13 01:54:21.835465 systemd[1]: Queued start job for default target initrd.target. Dec 13 01:54:21.835476 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:54:21.835486 systemd[1]: Reached target cryptsetup.target. Dec 13 01:54:21.835498 systemd[1]: Reached target paths.target. Dec 13 01:54:21.835509 systemd[1]: Reached target slices.target. Dec 13 01:54:21.835519 systemd[1]: Reached target swap.target. Dec 13 01:54:21.835530 systemd[1]: Reached target timers.target. Dec 13 01:54:21.835541 systemd[1]: Listening on iscsid.socket. Dec 13 01:54:21.835552 systemd[1]: Listening on iscsiuio.socket. Dec 13 01:54:21.835563 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:54:21.835574 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:54:21.835586 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:54:21.835597 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:54:21.835618 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:54:21.835629 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:54:21.835639 systemd[1]: Reached target sockets.target. Dec 13 01:54:21.835650 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:54:21.835661 systemd[1]: Finished network-cleanup.service. Dec 13 01:54:21.835673 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 01:54:21.835683 systemd[1]: Starting systemd-journald.service... Dec 13 01:54:21.835696 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:54:21.835707 systemd[1]: Starting systemd-resolved.service... Dec 13 01:54:21.835718 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 01:54:21.835728 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:54:21.835739 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 01:54:21.835751 kernel: audit: type=1130 audit(1734054861.825:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.835762 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:54:21.835778 systemd-journald[197]: Journal started Dec 13 01:54:21.835855 systemd-journald[197]: Runtime Journal (/run/log/journal/4578d9cf780c4603a6a432ccfae75cf2) is 6.0M, max 48.4M, 42.4M free. Dec 13 01:54:21.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.836741 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 01:54:21.839010 systemd[1]: Started systemd-journald.service. Dec 13 01:54:21.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.842818 kernel: audit: type=1130 audit(1734054861.839:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.843114 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 01:54:21.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.844251 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:54:21.852286 kernel: audit: type=1130 audit(1734054861.843:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.852303 kernel: audit: type=1130 audit(1734054861.846:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.848432 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 01:54:21.863693 systemd-resolved[199]: Positive Trust Anchors: Dec 13 01:54:21.863712 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:54:21.863742 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:54:21.868407 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 01:54:21.872911 kernel: audit: type=1130 audit(1734054861.868:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.872908 systemd[1]: Starting dracut-cmdline.service... Dec 13 01:54:21.876274 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 01:54:21.879825 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 01:54:21.880348 systemd[1]: Started systemd-resolved.service. Dec 13 01:54:21.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.881993 systemd[1]: Reached target nss-lookup.target. Dec 13 01:54:21.886398 kernel: audit: type=1130 audit(1734054861.881:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.886422 dracut-cmdline[215]: dracut-dracut-053 Dec 13 01:54:21.887932 kernel: Bridge firewalling registered Dec 13 01:54:21.887908 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 01:54:21.889227 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:54:21.904834 kernel: SCSI subsystem initialized Dec 13 01:54:21.916775 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 01:54:21.916820 kernel: device-mapper: uevent: version 1.0.3 Dec 13 01:54:21.916832 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 01:54:21.919451 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 01:54:21.920591 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:54:21.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.923015 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:54:21.926778 kernel: audit: type=1130 audit(1734054861.921:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.930027 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:54:21.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.934829 kernel: audit: type=1130 audit(1734054861.930:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:21.951831 kernel: Loading iSCSI transport class v2.0-870. Dec 13 01:54:21.967841 kernel: iscsi: registered transport (tcp) Dec 13 01:54:21.988843 kernel: iscsi: registered transport (qla4xxx) Dec 13 01:54:21.988871 kernel: QLogic iSCSI HBA Driver Dec 13 01:54:22.019298 systemd[1]: Finished dracut-cmdline.service. Dec 13 01:54:22.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:22.021868 systemd[1]: Starting dracut-pre-udev.service... Dec 13 01:54:22.025689 kernel: audit: type=1130 audit(1734054862.020:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:22.069850 kernel: raid6: avx2x4 gen() 26686 MB/s Dec 13 01:54:22.086845 kernel: raid6: avx2x4 xor() 6739 MB/s Dec 13 01:54:22.103846 kernel: raid6: avx2x2 gen() 31709 MB/s Dec 13 01:54:22.120858 kernel: raid6: avx2x2 xor() 18966 MB/s Dec 13 01:54:22.137846 kernel: raid6: avx2x1 gen() 25625 MB/s Dec 13 01:54:22.154841 kernel: raid6: avx2x1 xor() 15307 MB/s Dec 13 01:54:22.171865 kernel: raid6: sse2x4 gen() 14712 MB/s Dec 13 01:54:22.188845 kernel: raid6: sse2x4 xor() 6979 MB/s Dec 13 01:54:22.205840 kernel: raid6: sse2x2 gen() 15562 MB/s Dec 13 01:54:22.222853 kernel: raid6: sse2x2 xor() 9715 MB/s Dec 13 01:54:22.239863 kernel: raid6: sse2x1 gen() 12134 MB/s Dec 13 01:54:22.257278 kernel: raid6: sse2x1 xor() 7641 MB/s Dec 13 01:54:22.257350 kernel: raid6: using algorithm avx2x2 gen() 31709 MB/s Dec 13 01:54:22.257363 kernel: raid6: .... xor() 18966 MB/s, rmw enabled Dec 13 01:54:22.258009 kernel: raid6: using avx2x2 recovery algorithm Dec 13 01:54:22.271830 kernel: xor: automatically using best checksumming function avx Dec 13 01:54:22.364849 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 01:54:22.371839 systemd[1]: Finished dracut-pre-udev.service. Dec 13 01:54:22.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:22.373000 audit: BPF prog-id=7 op=LOAD Dec 13 01:54:22.373000 audit: BPF prog-id=8 op=LOAD Dec 13 01:54:22.374397 systemd[1]: Starting systemd-udevd.service... Dec 13 01:54:22.386610 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 01:54:22.390640 systemd[1]: Started systemd-udevd.service. Dec 13 01:54:22.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:22.394388 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 01:54:22.401910 dracut-pre-trigger[411]: rd.md=0: removing MD RAID activation Dec 13 01:54:22.421971 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 01:54:22.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:22.424371 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:54:22.454316 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:54:22.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:22.483837 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 01:54:22.516503 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 01:54:22.516523 kernel: libata version 3.00 loaded. Dec 13 01:54:22.516536 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 01:54:22.516548 kernel: AES CTR mode by8 optimization enabled Dec 13 01:54:22.516560 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 01:54:22.541619 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 01:54:22.541641 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 01:54:22.541655 kernel: GPT:9289727 != 19775487 Dec 13 01:54:22.541667 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 01:54:22.541685 kernel: GPT:9289727 != 19775487 Dec 13 01:54:22.541696 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 01:54:22.541708 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:54:22.541720 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 01:54:22.541856 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 01:54:22.541965 kernel: scsi host0: ahci Dec 13 01:54:22.542082 kernel: scsi host1: ahci Dec 13 01:54:22.542196 kernel: scsi host2: ahci Dec 13 01:54:22.542301 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (446) Dec 13 01:54:22.542315 kernel: scsi host3: ahci Dec 13 01:54:22.542420 kernel: scsi host4: ahci Dec 13 01:54:22.542538 kernel: scsi host5: ahci Dec 13 01:54:22.542665 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 01:54:22.542679 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 01:54:22.542694 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 01:54:22.542706 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 01:54:22.542718 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 01:54:22.542729 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 01:54:22.531399 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 01:54:22.544323 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 01:54:22.546947 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 01:54:22.553197 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 01:54:22.557005 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:54:22.558518 systemd[1]: Starting disk-uuid.service... Dec 13 01:54:22.723665 disk-uuid[532]: Primary Header is updated. Dec 13 01:54:22.723665 disk-uuid[532]: Secondary Entries is updated. Dec 13 01:54:22.723665 disk-uuid[532]: Secondary Header is updated. Dec 13 01:54:22.730828 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:54:22.733836 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:54:22.851291 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 01:54:22.851345 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 01:54:22.851832 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 01:54:22.852833 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 01:54:22.853834 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 01:54:22.855216 kernel: ata3.00: applying bridge limits Dec 13 01:54:22.855228 kernel: ata3.00: configured for UDMA/100 Dec 13 01:54:22.855825 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 01:54:22.860832 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 01:54:22.860859 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 01:54:22.889832 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 01:54:22.906275 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 01:54:22.906292 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 01:54:23.734422 disk-uuid[533]: The operation has completed successfully. Dec 13 01:54:23.735683 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 01:54:23.758180 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 01:54:23.758252 systemd[1]: Finished disk-uuid.service. Dec 13 01:54:23.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.764110 systemd[1]: Starting verity-setup.service... Dec 13 01:54:23.774839 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 01:54:23.790739 systemd[1]: Found device dev-mapper-usr.device. Dec 13 01:54:23.793463 systemd[1]: Mounting sysusr-usr.mount... Dec 13 01:54:23.795351 systemd[1]: Finished verity-setup.service. Dec 13 01:54:23.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.850618 systemd[1]: Mounted sysusr-usr.mount. Dec 13 01:54:23.852081 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 01:54:23.852132 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 01:54:23.854067 systemd[1]: Starting ignition-setup.service... Dec 13 01:54:23.856348 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 01:54:23.862630 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:54:23.862656 kernel: BTRFS info (device vda6): using free space tree Dec 13 01:54:23.862665 kernel: BTRFS info (device vda6): has skinny extents Dec 13 01:54:23.870833 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 01:54:23.879627 systemd[1]: Finished ignition-setup.service. Dec 13 01:54:23.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.881986 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 01:54:23.918257 ignition[647]: Ignition 2.14.0 Dec 13 01:54:23.918270 ignition[647]: Stage: fetch-offline Dec 13 01:54:23.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.918762 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 01:54:23.920000 audit: BPF prog-id=9 op=LOAD Dec 13 01:54:23.918337 ignition[647]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:54:23.921348 systemd[1]: Starting systemd-networkd.service... Dec 13 01:54:23.918345 ignition[647]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:54:23.918437 ignition[647]: parsed url from cmdline: "" Dec 13 01:54:23.918441 ignition[647]: no config URL provided Dec 13 01:54:23.918445 ignition[647]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:54:23.918452 ignition[647]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:54:23.918467 ignition[647]: op(1): [started] loading QEMU firmware config module Dec 13 01:54:23.918471 ignition[647]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 01:54:23.924602 ignition[647]: op(1): [finished] loading QEMU firmware config module Dec 13 01:54:23.942898 systemd-networkd[722]: lo: Link UP Dec 13 01:54:23.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.942906 systemd-networkd[722]: lo: Gained carrier Dec 13 01:54:23.943286 systemd-networkd[722]: Enumeration completed Dec 13 01:54:23.943483 systemd-networkd[722]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:54:23.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.943732 systemd[1]: Started systemd-networkd.service. Dec 13 01:54:23.944292 systemd-networkd[722]: eth0: Link UP Dec 13 01:54:23.944295 systemd-networkd[722]: eth0: Gained carrier Dec 13 01:54:23.945178 systemd[1]: Reached target network.target. Dec 13 01:54:23.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.959007 iscsid[727]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:54:23.959007 iscsid[727]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 01:54:23.959007 iscsid[727]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 01:54:23.959007 iscsid[727]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 01:54:23.959007 iscsid[727]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:54:23.959007 iscsid[727]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 01:54:23.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.946706 systemd[1]: Starting iscsiuio.service... Dec 13 01:54:23.950888 systemd[1]: Started iscsiuio.service. Dec 13 01:54:23.952370 systemd[1]: Starting iscsid.service... Dec 13 01:54:23.956576 systemd[1]: Started iscsid.service. Dec 13 01:54:23.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.958078 systemd[1]: Starting dracut-initqueue.service... Dec 13 01:54:23.968132 systemd[1]: Finished dracut-initqueue.service. Dec 13 01:54:23.969224 systemd[1]: Reached target remote-fs-pre.target. Dec 13 01:54:23.970165 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:54:23.971132 systemd[1]: Reached target remote-fs.target. Dec 13 01:54:23.972558 systemd[1]: Starting dracut-pre-mount.service... Dec 13 01:54:23.979955 systemd[1]: Finished dracut-pre-mount.service. Dec 13 01:54:23.991480 ignition[647]: parsing config with SHA512: ec01361acc9f46bb4742f938f87d0cd7915c02314d9977ff1f8860683a8774f0d97a37253f475c76af3fa793350e1c5af4d66449554b62e1be77ba8634e4c30b Dec 13 01:54:23.997301 unknown[647]: fetched base config from "system" Dec 13 01:54:23.997309 unknown[647]: fetched user config from "qemu" Dec 13 01:54:23.997703 ignition[647]: fetch-offline: fetch-offline passed Dec 13 01:54:23.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:23.998562 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 01:54:23.997749 ignition[647]: Ignition finished successfully Dec 13 01:54:23.999884 systemd-networkd[722]: eth0: DHCPv4 address 10.0.0.101/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 01:54:24.000072 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 01:54:24.000865 systemd[1]: Starting ignition-kargs.service... Dec 13 01:54:24.010084 ignition[741]: Ignition 2.14.0 Dec 13 01:54:24.010095 ignition[741]: Stage: kargs Dec 13 01:54:24.010185 ignition[741]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:54:24.010195 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:54:24.012502 systemd[1]: Finished ignition-kargs.service. Dec 13 01:54:24.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:24.010989 ignition[741]: kargs: kargs passed Dec 13 01:54:24.014925 systemd[1]: Starting ignition-disks.service... Dec 13 01:54:24.011023 ignition[741]: Ignition finished successfully Dec 13 01:54:24.021068 ignition[747]: Ignition 2.14.0 Dec 13 01:54:24.021076 ignition[747]: Stage: disks Dec 13 01:54:24.021159 ignition[747]: no configs at "/usr/lib/ignition/base.d" Dec 13 01:54:24.022634 systemd[1]: Finished ignition-disks.service. Dec 13 01:54:24.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:24.021167 ignition[747]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:54:24.024273 systemd[1]: Reached target initrd-root-device.target. Dec 13 01:54:24.022035 ignition[747]: disks: disks passed Dec 13 01:54:24.025863 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:54:24.022064 ignition[747]: Ignition finished successfully Dec 13 01:54:24.026695 systemd[1]: Reached target local-fs.target. Dec 13 01:54:24.028493 systemd[1]: Reached target sysinit.target. Dec 13 01:54:24.028538 systemd[1]: Reached target basic.target. Dec 13 01:54:24.029409 systemd[1]: Starting systemd-fsck-root.service... Dec 13 01:54:24.040220 systemd-fsck[755]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 01:54:24.045562 systemd[1]: Finished systemd-fsck-root.service. Dec 13 01:54:24.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:24.048403 systemd[1]: Mounting sysroot.mount... Dec 13 01:54:24.054726 systemd[1]: Mounted sysroot.mount. Dec 13 01:54:24.056085 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 01:54:24.056117 systemd[1]: Reached target initrd-root-fs.target. Dec 13 01:54:24.058427 systemd[1]: Mounting sysroot-usr.mount... Dec 13 01:54:24.060038 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 01:54:24.060070 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 01:54:24.061388 systemd[1]: Reached target ignition-diskful.target. Dec 13 01:54:24.065268 systemd[1]: Mounted sysroot-usr.mount. Dec 13 01:54:24.067244 systemd[1]: Starting initrd-setup-root.service... Dec 13 01:54:24.071085 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 01:54:24.075066 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory Dec 13 01:54:24.078600 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 01:54:24.082036 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 01:54:24.104877 systemd[1]: Finished initrd-setup-root.service. Dec 13 01:54:24.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:24.107149 systemd[1]: Starting ignition-mount.service... Dec 13 01:54:24.109106 systemd[1]: Starting sysroot-boot.service... Dec 13 01:54:24.112226 bash[806]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 01:54:24.120098 ignition[807]: INFO : Ignition 2.14.0 Dec 13 01:54:24.120098 ignition[807]: INFO : Stage: mount Dec 13 01:54:24.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:24.122785 ignition[807]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:54:24.122785 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:54:24.122785 ignition[807]: INFO : mount: mount passed Dec 13 01:54:24.122785 ignition[807]: INFO : Ignition finished successfully Dec 13 01:54:24.121689 systemd[1]: Finished ignition-mount.service. Dec 13 01:54:24.128383 systemd[1]: Finished sysroot-boot.service. Dec 13 01:54:24.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:24.802190 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:54:24.807831 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (816) Dec 13 01:54:24.807865 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:54:24.810374 kernel: BTRFS info (device vda6): using free space tree Dec 13 01:54:24.810396 kernel: BTRFS info (device vda6): has skinny extents Dec 13 01:54:24.813184 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:54:24.815411 systemd[1]: Starting ignition-files.service... Dec 13 01:54:24.827980 ignition[836]: INFO : Ignition 2.14.0 Dec 13 01:54:24.827980 ignition[836]: INFO : Stage: files Dec 13 01:54:24.829788 ignition[836]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:54:24.829788 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:54:24.829788 ignition[836]: DEBUG : files: compiled without relabeling support, skipping Dec 13 01:54:24.833540 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 01:54:24.833540 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 01:54:24.833540 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 01:54:24.833540 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 01:54:24.833540 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 01:54:24.833540 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:54:24.833540 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 01:54:24.832537 unknown[836]: wrote ssh authorized keys file for user: core Dec 13 01:54:24.879319 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 01:54:24.994091 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:54:24.994091 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 01:54:24.998237 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 01:54:25.474953 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 01:54:25.643951 systemd-networkd[722]: eth0: Gained IPv6LL Dec 13 01:54:25.727547 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 01:54:25.727547 ignition[836]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 01:54:25.731308 ignition[836]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:54:25.731308 ignition[836]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:54:25.731308 ignition[836]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 01:54:25.731308 ignition[836]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 01:54:25.731308 ignition[836]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 01:54:25.731308 ignition[836]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 01:54:25.731308 ignition[836]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 01:54:25.731308 ignition[836]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 01:54:25.731308 ignition[836]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 01:54:25.761316 ignition[836]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 01:54:25.763035 ignition[836]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 01:54:25.763035 ignition[836]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" Dec 13 01:54:25.763035 ignition[836]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 01:54:25.763035 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:54:25.763035 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:54:25.763035 ignition[836]: INFO : files: files passed Dec 13 01:54:25.763035 ignition[836]: INFO : Ignition finished successfully Dec 13 01:54:25.772728 systemd[1]: Finished ignition-files.service. Dec 13 01:54:25.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.774464 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 01:54:25.774563 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 01:54:25.775353 systemd[1]: Starting ignition-quench.service... Dec 13 01:54:25.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.779613 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 01:54:25.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.784572 initrd-setup-root-after-ignition[861]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 01:54:25.779679 systemd[1]: Finished ignition-quench.service. Dec 13 01:54:25.786979 initrd-setup-root-after-ignition[863]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 01:54:25.781202 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 01:54:25.781358 systemd[1]: Reached target ignition-complete.target. Dec 13 01:54:25.781984 systemd[1]: Starting initrd-parse-etc.service... Dec 13 01:54:25.792513 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 01:54:25.792613 systemd[1]: Finished initrd-parse-etc.service. Dec 13 01:54:25.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.794588 systemd[1]: Reached target initrd-fs.target. Dec 13 01:54:25.796086 systemd[1]: Reached target initrd.target. Dec 13 01:54:25.797671 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 01:54:25.798408 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 01:54:25.808615 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 01:54:25.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.810060 systemd[1]: Starting initrd-cleanup.service... Dec 13 01:54:25.817257 systemd[1]: Stopped target nss-lookup.target. Dec 13 01:54:25.818159 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 01:54:25.819885 systemd[1]: Stopped target timers.target. Dec 13 01:54:25.821574 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 01:54:25.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.821685 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 01:54:25.823263 systemd[1]: Stopped target initrd.target. Dec 13 01:54:25.824882 systemd[1]: Stopped target basic.target. Dec 13 01:54:25.826398 systemd[1]: Stopped target ignition-complete.target. Dec 13 01:54:25.828014 systemd[1]: Stopped target ignition-diskful.target. Dec 13 01:54:25.829587 systemd[1]: Stopped target initrd-root-device.target. Dec 13 01:54:25.831321 systemd[1]: Stopped target remote-fs.target. Dec 13 01:54:25.832956 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 01:54:25.834647 systemd[1]: Stopped target sysinit.target. Dec 13 01:54:25.836197 systemd[1]: Stopped target local-fs.target. Dec 13 01:54:25.837857 systemd[1]: Stopped target local-fs-pre.target. Dec 13 01:54:25.839423 systemd[1]: Stopped target swap.target. Dec 13 01:54:25.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.840929 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 01:54:25.841035 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 01:54:25.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.842667 systemd[1]: Stopped target cryptsetup.target. Dec 13 01:54:25.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.844128 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 01:54:25.844221 systemd[1]: Stopped dracut-initqueue.service. Dec 13 01:54:25.846000 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 01:54:25.846096 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 01:54:25.847675 systemd[1]: Stopped target paths.target. Dec 13 01:54:25.849299 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 01:54:25.852865 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 01:54:25.854225 systemd[1]: Stopped target slices.target. Dec 13 01:54:25.855779 systemd[1]: Stopped target sockets.target. Dec 13 01:54:25.857710 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 01:54:25.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.857781 systemd[1]: Closed iscsid.socket. Dec 13 01:54:25.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.859343 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 01:54:25.859413 systemd[1]: Closed iscsiuio.socket. Dec 13 01:54:25.860872 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 01:54:25.860956 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 01:54:25.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.871957 ignition[876]: INFO : Ignition 2.14.0 Dec 13 01:54:25.871957 ignition[876]: INFO : Stage: umount Dec 13 01:54:25.871957 ignition[876]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 01:54:25.871957 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 01:54:25.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.862669 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 01:54:25.879550 ignition[876]: INFO : umount: umount passed Dec 13 01:54:25.879550 ignition[876]: INFO : Ignition finished successfully Dec 13 01:54:25.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.862744 systemd[1]: Stopped ignition-files.service. Dec 13 01:54:25.865257 systemd[1]: Stopping ignition-mount.service... Dec 13 01:54:25.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.867273 systemd[1]: Stopping sysroot-boot.service... Dec 13 01:54:25.868040 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 01:54:25.868175 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 01:54:25.870176 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 01:54:25.870311 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 01:54:25.873883 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 01:54:25.873950 systemd[1]: Stopped ignition-mount.service. Dec 13 01:54:25.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.876468 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 01:54:25.876541 systemd[1]: Finished initrd-cleanup.service. Dec 13 01:54:25.878312 systemd[1]: Stopped target network.target. Dec 13 01:54:25.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.879525 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 01:54:25.879559 systemd[1]: Stopped ignition-disks.service. Dec 13 01:54:25.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.881136 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 01:54:25.881163 systemd[1]: Stopped ignition-kargs.service. Dec 13 01:54:25.883164 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 01:54:25.883194 systemd[1]: Stopped ignition-setup.service. Dec 13 01:54:25.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.885195 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:54:25.886510 systemd[1]: Stopping systemd-resolved.service... Dec 13 01:54:25.888709 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 01:54:25.890887 systemd-networkd[722]: eth0: DHCPv6 lease lost Dec 13 01:54:25.910000 audit: BPF prog-id=9 op=UNLOAD Dec 13 01:54:25.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.892089 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:54:25.892159 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:54:25.913000 audit: BPF prog-id=6 op=UNLOAD Dec 13 01:54:25.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.894761 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 01:54:25.894784 systemd[1]: Closed systemd-networkd.socket. Dec 13 01:54:25.897056 systemd[1]: Stopping network-cleanup.service... Dec 13 01:54:25.898059 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 01:54:25.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.898106 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 01:54:25.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.899733 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 01:54:25.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.899771 systemd[1]: Stopped systemd-sysctl.service. Dec 13 01:54:25.901560 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 01:54:25.901598 systemd[1]: Stopped systemd-modules-load.service. Dec 13 01:54:25.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:25.903279 systemd[1]: Stopping systemd-udevd.service... Dec 13 01:54:25.905775 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 01:54:25.906181 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 01:54:25.906252 systemd[1]: Stopped systemd-resolved.service. Dec 13 01:54:25.911093 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 01:54:25.911193 systemd[1]: Stopped systemd-udevd.service. Dec 13 01:54:25.913934 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 01:54:25.914000 systemd[1]: Stopped network-cleanup.service. Dec 13 01:54:25.915485 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 01:54:25.915521 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 01:54:25.917234 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 01:54:25.917256 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 01:54:25.918851 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 01:54:25.918883 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 01:54:25.920440 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 01:54:25.920466 systemd[1]: Stopped dracut-cmdline.service. Dec 13 01:54:25.922231 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 01:54:25.922260 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 01:54:25.923113 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 01:54:25.924674 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 01:54:25.924714 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 01:54:25.925650 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 01:54:25.925677 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 01:54:25.927332 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 01:54:25.927363 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 01:54:25.928919 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 01:54:25.929232 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 01:54:25.929290 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 01:54:26.084094 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 01:54:26.084191 systemd[1]: Stopped sysroot-boot.service. Dec 13 01:54:26.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:26.086678 systemd[1]: Reached target initrd-switch-root.target. Dec 13 01:54:26.088427 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 01:54:26.088461 systemd[1]: Stopped initrd-setup-root.service. Dec 13 01:54:26.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:26.091495 systemd[1]: Starting initrd-switch-root.service... Dec 13 01:54:26.107874 systemd[1]: Switching root. Dec 13 01:54:26.114285 iscsid[727]: iscsid shutting down. Dec 13 01:54:26.115021 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Dec 13 01:54:26.115056 systemd-journald[197]: Journal stopped Dec 13 01:54:28.915418 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 01:54:28.915468 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 01:54:28.915478 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 01:54:28.915488 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 01:54:28.915497 kernel: SELinux: policy capability open_perms=1 Dec 13 01:54:28.915507 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 01:54:28.915517 kernel: SELinux: policy capability always_check_network=0 Dec 13 01:54:28.915526 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 01:54:28.915538 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 01:54:28.915548 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 01:54:28.915558 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 01:54:28.915571 systemd[1]: Successfully loaded SELinux policy in 36.947ms. Dec 13 01:54:28.915591 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.950ms. Dec 13 01:54:28.915603 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:54:28.915613 systemd[1]: Detected virtualization kvm. Dec 13 01:54:28.915625 systemd[1]: Detected architecture x86-64. Dec 13 01:54:28.915635 systemd[1]: Detected first boot. Dec 13 01:54:28.915645 systemd[1]: Initializing machine ID from VM UUID. Dec 13 01:54:28.915656 kernel: kauditd_printk_skb: 65 callbacks suppressed Dec 13 01:54:28.915667 kernel: audit: type=1400 audit(1734054866.615:76): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:54:28.915678 kernel: audit: type=1400 audit(1734054866.615:77): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:54:28.915687 kernel: audit: type=1334 audit(1734054866.618:78): prog-id=10 op=LOAD Dec 13 01:54:28.915696 kernel: audit: type=1334 audit(1734054866.618:79): prog-id=10 op=UNLOAD Dec 13 01:54:28.915706 kernel: audit: type=1334 audit(1734054866.622:80): prog-id=11 op=LOAD Dec 13 01:54:28.915715 kernel: audit: type=1334 audit(1734054866.622:81): prog-id=11 op=UNLOAD Dec 13 01:54:28.915726 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 01:54:28.915736 kernel: audit: type=1400 audit(1734054866.653:82): avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:54:28.915747 kernel: audit: type=1300 audit(1734054866.653:82): arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:28.915757 kernel: audit: type=1327 audit(1734054866.653:82): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:54:28.915767 kernel: audit: type=1400 audit(1734054866.655:83): avc: denied { associate } for pid=910 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:54:28.915778 systemd[1]: Populated /etc with preset unit settings. Dec 13 01:54:28.915790 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:54:28.915800 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:54:28.915823 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:54:28.915833 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 01:54:28.915843 systemd[1]: Stopped iscsiuio.service. Dec 13 01:54:28.915853 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 01:54:28.915863 systemd[1]: Stopped iscsid.service. Dec 13 01:54:28.915874 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 01:54:28.915884 systemd[1]: Stopped initrd-switch-root.service. Dec 13 01:54:28.915895 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 01:54:28.915905 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 01:54:28.915917 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 01:54:28.915927 systemd[1]: Created slice system-getty.slice. Dec 13 01:54:28.915937 systemd[1]: Created slice system-modprobe.slice. Dec 13 01:54:28.915947 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 01:54:28.915958 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 01:54:28.915968 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 01:54:28.915979 systemd[1]: Created slice user.slice. Dec 13 01:54:28.915989 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:54:28.915998 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 01:54:28.916010 systemd[1]: Set up automount boot.automount. Dec 13 01:54:28.916020 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 01:54:28.916030 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 01:54:28.916041 systemd[1]: Stopped target initrd-fs.target. Dec 13 01:54:28.916051 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 01:54:28.916061 systemd[1]: Reached target integritysetup.target. Dec 13 01:54:28.916071 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:54:28.916081 systemd[1]: Reached target remote-fs.target. Dec 13 01:54:28.916091 systemd[1]: Reached target slices.target. Dec 13 01:54:28.916101 systemd[1]: Reached target swap.target. Dec 13 01:54:28.916112 systemd[1]: Reached target torcx.target. Dec 13 01:54:28.916123 systemd[1]: Reached target veritysetup.target. Dec 13 01:54:28.916133 systemd[1]: Listening on systemd-coredump.socket. Dec 13 01:54:28.916144 systemd[1]: Listening on systemd-initctl.socket. Dec 13 01:54:28.916154 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:54:28.916164 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:54:28.916176 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:54:28.916186 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 01:54:28.916195 systemd[1]: Mounting dev-hugepages.mount... Dec 13 01:54:28.916207 systemd[1]: Mounting dev-mqueue.mount... Dec 13 01:54:28.916217 systemd[1]: Mounting media.mount... Dec 13 01:54:28.916228 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:28.916238 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 01:54:28.916248 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 01:54:28.916259 systemd[1]: Mounting tmp.mount... Dec 13 01:54:28.916269 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 01:54:28.916279 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:54:28.916290 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:54:28.916301 systemd[1]: Starting modprobe@configfs.service... Dec 13 01:54:28.916311 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:54:28.916321 systemd[1]: Starting modprobe@drm.service... Dec 13 01:54:28.916331 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:54:28.916341 systemd[1]: Starting modprobe@fuse.service... Dec 13 01:54:28.916351 systemd[1]: Starting modprobe@loop.service... Dec 13 01:54:28.916362 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 01:54:28.916372 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 01:54:28.916382 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 01:54:28.916394 kernel: loop: module loaded Dec 13 01:54:28.916414 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 01:54:28.916424 kernel: fuse: init (API version 7.34) Dec 13 01:54:28.916434 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 01:54:28.916445 systemd[1]: Stopped systemd-journald.service. Dec 13 01:54:28.916455 systemd[1]: Starting systemd-journald.service... Dec 13 01:54:28.916465 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:54:28.916475 systemd[1]: Starting systemd-network-generator.service... Dec 13 01:54:28.916486 systemd[1]: Starting systemd-remount-fs.service... Dec 13 01:54:28.916497 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:54:28.916507 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 01:54:28.916517 systemd[1]: Stopped verity-setup.service. Dec 13 01:54:28.916528 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:28.916541 systemd-journald[995]: Journal started Dec 13 01:54:28.916577 systemd-journald[995]: Runtime Journal (/run/log/journal/4578d9cf780c4603a6a432ccfae75cf2) is 6.0M, max 48.4M, 42.4M free. Dec 13 01:54:26.170000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:54:26.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:54:26.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:54:26.618000 audit: BPF prog-id=10 op=LOAD Dec 13 01:54:26.618000 audit: BPF prog-id=10 op=UNLOAD Dec 13 01:54:26.622000 audit: BPF prog-id=11 op=LOAD Dec 13 01:54:26.622000 audit: BPF prog-id=11 op=UNLOAD Dec 13 01:54:26.653000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:54:26.653000 audit[910]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:26.653000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:54:26.655000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:54:26.655000 audit[910]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018f9b9 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:26.655000 audit: CWD cwd="/" Dec 13 01:54:26.655000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:26.655000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:26.655000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:54:28.736000 audit: BPF prog-id=12 op=LOAD Dec 13 01:54:28.736000 audit: BPF prog-id=3 op=UNLOAD Dec 13 01:54:28.736000 audit: BPF prog-id=13 op=LOAD Dec 13 01:54:28.736000 audit: BPF prog-id=14 op=LOAD Dec 13 01:54:28.736000 audit: BPF prog-id=4 op=UNLOAD Dec 13 01:54:28.736000 audit: BPF prog-id=5 op=UNLOAD Dec 13 01:54:28.738000 audit: BPF prog-id=15 op=LOAD Dec 13 01:54:28.738000 audit: BPF prog-id=12 op=UNLOAD Dec 13 01:54:28.738000 audit: BPF prog-id=16 op=LOAD Dec 13 01:54:28.738000 audit: BPF prog-id=17 op=LOAD Dec 13 01:54:28.738000 audit: BPF prog-id=13 op=UNLOAD Dec 13 01:54:28.738000 audit: BPF prog-id=14 op=UNLOAD Dec 13 01:54:28.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.750000 audit: BPF prog-id=15 op=UNLOAD Dec 13 01:54:28.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.884000 audit: BPF prog-id=18 op=LOAD Dec 13 01:54:28.884000 audit: BPF prog-id=19 op=LOAD Dec 13 01:54:28.884000 audit: BPF prog-id=20 op=LOAD Dec 13 01:54:28.884000 audit: BPF prog-id=16 op=UNLOAD Dec 13 01:54:28.884000 audit: BPF prog-id=17 op=UNLOAD Dec 13 01:54:28.912000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 01:54:28.912000 audit[995]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff988ee880 a2=4000 a3=7fff988ee91c items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:28.912000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 01:54:28.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.735275 systemd[1]: Queued start job for default target multi-user.target. Dec 13 01:54:26.652645 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:54:28.735289 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 01:54:26.652882 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:54:28.740181 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 01:54:26.652898 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:54:26.652925 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 01:54:26.652934 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 01:54:26.652960 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 01:54:26.652971 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 01:54:26.653152 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 01:54:26.653181 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:54:26.653193 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:54:26.653791 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 01:54:26.653843 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 01:54:26.653859 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 01:54:26.653871 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 01:54:26.653886 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 01:54:26.653899 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 01:54:28.479354 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:28Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:54:28.479631 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:28Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:54:28.479723 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:28Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:54:28.480156 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:28Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:54:28.480219 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:28Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 01:54:28.480284 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T01:54:28Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 01:54:28.920051 systemd[1]: Started systemd-journald.service. Dec 13 01:54:28.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.920585 systemd[1]: Mounted dev-hugepages.mount. Dec 13 01:54:28.921435 systemd[1]: Mounted dev-mqueue.mount. Dec 13 01:54:28.922256 systemd[1]: Mounted media.mount. Dec 13 01:54:28.923019 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 01:54:28.923943 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 01:54:28.924936 systemd[1]: Mounted tmp.mount. Dec 13 01:54:28.925930 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 01:54:28.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.927218 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:54:28.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.928252 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 01:54:28.928384 systemd[1]: Finished modprobe@configfs.service. Dec 13 01:54:28.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.929444 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:54:28.929580 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:54:28.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.930605 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:54:28.930757 systemd[1]: Finished modprobe@drm.service. Dec 13 01:54:28.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.931741 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:54:28.931870 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:54:28.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.933016 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 01:54:28.933158 systemd[1]: Finished modprobe@fuse.service. Dec 13 01:54:28.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.934382 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:54:28.934591 systemd[1]: Finished modprobe@loop.service. Dec 13 01:54:28.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.935750 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:54:28.937152 systemd[1]: Finished systemd-network-generator.service. Dec 13 01:54:28.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.938392 systemd[1]: Finished systemd-remount-fs.service. Dec 13 01:54:28.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.939838 systemd[1]: Reached target network-pre.target. Dec 13 01:54:28.942078 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 01:54:28.944069 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 01:54:28.944872 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 01:54:28.946571 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 01:54:28.948939 systemd[1]: Starting systemd-journal-flush.service... Dec 13 01:54:28.949970 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:54:28.951196 systemd[1]: Starting systemd-random-seed.service... Dec 13 01:54:28.952056 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:54:28.953164 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:54:28.956902 systemd-journald[995]: Time spent on flushing to /var/log/journal/4578d9cf780c4603a6a432ccfae75cf2 is 25.780ms for 1163 entries. Dec 13 01:54:28.956902 systemd-journald[995]: System Journal (/var/log/journal/4578d9cf780c4603a6a432ccfae75cf2) is 8.0M, max 195.6M, 187.6M free. Dec 13 01:54:29.000332 systemd-journald[995]: Received client request to flush runtime journal. Dec 13 01:54:28.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:28.959746 systemd[1]: Starting systemd-sysusers.service... Dec 13 01:54:28.963342 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 01:54:28.964374 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 01:54:29.001256 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 01:54:28.965553 systemd[1]: Finished systemd-random-seed.service. Dec 13 01:54:28.966937 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:54:28.968119 systemd[1]: Reached target first-boot-complete.target. Dec 13 01:54:28.970578 systemd[1]: Starting systemd-udev-settle.service... Dec 13 01:54:28.978226 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:54:28.982731 systemd[1]: Finished systemd-sysusers.service. Dec 13 01:54:28.985171 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:54:29.001500 systemd[1]: Finished systemd-journal-flush.service. Dec 13 01:54:29.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.012092 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:54:29.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.618884 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 01:54:29.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.620000 audit: BPF prog-id=21 op=LOAD Dec 13 01:54:29.620000 audit: BPF prog-id=22 op=LOAD Dec 13 01:54:29.620000 audit: BPF prog-id=7 op=UNLOAD Dec 13 01:54:29.620000 audit: BPF prog-id=8 op=UNLOAD Dec 13 01:54:29.621441 systemd[1]: Starting systemd-udevd.service... Dec 13 01:54:29.643246 systemd-udevd[1019]: Using default interface naming scheme 'v252'. Dec 13 01:54:29.654548 systemd[1]: Started systemd-udevd.service. Dec 13 01:54:29.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.656000 audit: BPF prog-id=23 op=LOAD Dec 13 01:54:29.659037 systemd[1]: Starting systemd-networkd.service... Dec 13 01:54:29.664000 audit: BPF prog-id=24 op=LOAD Dec 13 01:54:29.664000 audit: BPF prog-id=25 op=LOAD Dec 13 01:54:29.664000 audit: BPF prog-id=26 op=LOAD Dec 13 01:54:29.665961 systemd[1]: Starting systemd-userdbd.service... Dec 13 01:54:29.676937 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 01:54:29.703007 systemd[1]: Started systemd-userdbd.service. Dec 13 01:54:29.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.717835 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 01:54:29.721826 kernel: ACPI: button: Power Button [PWRF] Dec 13 01:54:29.725083 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:54:29.755635 systemd-networkd[1038]: lo: Link UP Dec 13 01:54:29.755647 systemd-networkd[1038]: lo: Gained carrier Dec 13 01:54:29.756142 systemd-networkd[1038]: Enumeration completed Dec 13 01:54:29.756237 systemd[1]: Started systemd-networkd.service. Dec 13 01:54:29.756252 systemd-networkd[1038]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:54:29.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.758298 systemd-networkd[1038]: eth0: Link UP Dec 13 01:54:29.758308 systemd-networkd[1038]: eth0: Gained carrier Dec 13 01:54:29.739000 audit[1026]: AVC avc: denied { confidentiality } for pid=1026 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:54:29.739000 audit[1026]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5562d14d2190 a1=337fc a2=7f96ed1ebbc5 a3=5 items=110 ppid=1019 pid=1026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:29.739000 audit: CWD cwd="/" Dec 13 01:54:29.772303 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 01:54:29.786091 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 01:54:29.786236 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 01:54:29.786394 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 01:54:29.786517 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 01:54:29.739000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=1 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=2 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=3 name=(null) inode=12105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=4 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=5 name=(null) inode=12106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=6 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=7 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=8 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=9 name=(null) inode=12108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=10 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=11 name=(null) inode=12109 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=12 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=13 name=(null) inode=12110 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=14 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=15 name=(null) inode=12111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=16 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=17 name=(null) inode=12112 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=18 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=19 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=20 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=21 name=(null) inode=12114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=22 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=23 name=(null) inode=12115 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=24 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=25 name=(null) inode=12116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=26 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=27 name=(null) inode=12117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=28 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=29 name=(null) inode=12118 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=30 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=31 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=32 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=33 name=(null) inode=12120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=34 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=35 name=(null) inode=12121 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=36 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=37 name=(null) inode=12122 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=38 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=39 name=(null) inode=12123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=40 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=41 name=(null) inode=12124 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=42 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=43 name=(null) inode=12125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=44 name=(null) inode=12125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=45 name=(null) inode=12126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=46 name=(null) inode=12125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=47 name=(null) inode=12127 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=48 name=(null) inode=12125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=49 name=(null) inode=12128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=50 name=(null) inode=12125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=51 name=(null) inode=12129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=52 name=(null) inode=12125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=53 name=(null) inode=12130 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=55 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=56 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=57 name=(null) inode=12132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=58 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=59 name=(null) inode=12133 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=60 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=61 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=62 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=63 name=(null) inode=12135 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=64 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=65 name=(null) inode=12136 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=66 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=67 name=(null) inode=12137 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=68 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=69 name=(null) inode=12138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=70 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=71 name=(null) inode=12139 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=72 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=73 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=74 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=75 name=(null) inode=12141 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=76 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=77 name=(null) inode=12142 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=78 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=79 name=(null) inode=12143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=80 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=81 name=(null) inode=12144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=82 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=83 name=(null) inode=12145 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=84 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=85 name=(null) inode=12146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=86 name=(null) inode=12146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=87 name=(null) inode=12147 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=88 name=(null) inode=12146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=89 name=(null) inode=12148 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=90 name=(null) inode=12146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=91 name=(null) inode=12149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=92 name=(null) inode=12146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=93 name=(null) inode=12150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=94 name=(null) inode=12146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=95 name=(null) inode=12151 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=96 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=97 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=98 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=99 name=(null) inode=12153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=100 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=101 name=(null) inode=12154 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=102 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=103 name=(null) inode=12155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=104 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=105 name=(null) inode=12156 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=106 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=107 name=(null) inode=12157 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PATH item=109 name=(null) inode=12158 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:54:29.739000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 01:54:29.772934 systemd-networkd[1038]: eth0: DHCPv4 address 10.0.0.101/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 01:54:29.803834 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 01:54:29.826432 kernel: kvm: Nested Virtualization enabled Dec 13 01:54:29.826503 kernel: SVM: kvm: Nested Paging enabled Dec 13 01:54:29.826538 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 01:54:29.828172 kernel: SVM: Virtual GIF supported Dec 13 01:54:29.843834 kernel: EDAC MC: Ver: 3.0.0 Dec 13 01:54:29.870227 systemd[1]: Finished systemd-udev-settle.service. Dec 13 01:54:29.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.872312 systemd[1]: Starting lvm2-activation-early.service... Dec 13 01:54:29.879856 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:54:29.907799 systemd[1]: Finished lvm2-activation-early.service. Dec 13 01:54:29.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.909006 systemd[1]: Reached target cryptsetup.target. Dec 13 01:54:29.911172 systemd[1]: Starting lvm2-activation.service... Dec 13 01:54:29.914730 lvm[1057]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:54:29.940926 systemd[1]: Finished lvm2-activation.service. Dec 13 01:54:29.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.942040 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:54:29.943010 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 01:54:29.943036 systemd[1]: Reached target local-fs.target. Dec 13 01:54:29.943902 systemd[1]: Reached target machines.target. Dec 13 01:54:29.946000 systemd[1]: Starting ldconfig.service... Dec 13 01:54:29.947273 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:54:29.947321 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:54:29.948226 systemd[1]: Starting systemd-boot-update.service... Dec 13 01:54:29.950089 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 01:54:29.952334 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 01:54:29.954310 systemd[1]: Starting systemd-sysext.service... Dec 13 01:54:29.955351 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1059 (bootctl) Dec 13 01:54:29.956130 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 01:54:29.960158 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 01:54:29.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:29.966229 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 01:54:29.973018 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 01:54:29.973228 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 01:54:29.985844 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 01:54:30.487149 systemd-fsck[1068]: fsck.fat 4.2 (2021-01-31) Dec 13 01:54:30.487149 systemd-fsck[1068]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 01:54:30.488959 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 01:54:30.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.492044 systemd[1]: Mounting boot.mount... Dec 13 01:54:30.496833 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 01:54:30.498694 systemd[1]: Mounted boot.mount. Dec 13 01:54:30.511318 systemd[1]: Finished systemd-boot-update.service. Dec 13 01:54:30.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.518829 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 01:54:30.522335 (sd-sysext)[1072]: Using extensions 'kubernetes'. Dec 13 01:54:30.522619 (sd-sysext)[1072]: Merged extensions into '/usr'. Dec 13 01:54:30.536945 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:30.538391 systemd[1]: Mounting usr-share-oem.mount... Dec 13 01:54:30.539397 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.540414 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:54:30.542046 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:54:30.543886 systemd[1]: Starting modprobe@loop.service... Dec 13 01:54:30.572301 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.572445 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:54:30.572579 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:30.574990 systemd[1]: Mounted usr-share-oem.mount. Dec 13 01:54:30.576042 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:54:30.576162 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:54:30.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.577293 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:54:30.577408 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:54:30.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.578541 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:54:30.578636 systemd[1]: Finished modprobe@loop.service. Dec 13 01:54:30.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.579779 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:54:30.579881 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.580725 systemd[1]: Finished systemd-sysext.service. Dec 13 01:54:30.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.582575 systemd[1]: Starting ensure-sysext.service... Dec 13 01:54:30.584170 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 01:54:30.589377 systemd[1]: Reloading. Dec 13 01:54:30.594054 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 01:54:30.594987 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 01:54:30.596300 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 01:54:30.624637 ldconfig[1058]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 01:54:30.638848 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-12-13T01:54:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:54:30.638883 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-12-13T01:54:30Z" level=info msg="torcx already run" Dec 13 01:54:30.753652 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:54:30.753669 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:54:30.770024 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:54:30.817000 audit: BPF prog-id=27 op=LOAD Dec 13 01:54:30.817000 audit: BPF prog-id=18 op=UNLOAD Dec 13 01:54:30.817000 audit: BPF prog-id=28 op=LOAD Dec 13 01:54:30.817000 audit: BPF prog-id=29 op=LOAD Dec 13 01:54:30.817000 audit: BPF prog-id=19 op=UNLOAD Dec 13 01:54:30.817000 audit: BPF prog-id=20 op=UNLOAD Dec 13 01:54:30.819000 audit: BPF prog-id=30 op=LOAD Dec 13 01:54:30.819000 audit: BPF prog-id=24 op=UNLOAD Dec 13 01:54:30.819000 audit: BPF prog-id=31 op=LOAD Dec 13 01:54:30.819000 audit: BPF prog-id=32 op=LOAD Dec 13 01:54:30.819000 audit: BPF prog-id=25 op=UNLOAD Dec 13 01:54:30.819000 audit: BPF prog-id=26 op=UNLOAD Dec 13 01:54:30.820000 audit: BPF prog-id=33 op=LOAD Dec 13 01:54:30.820000 audit: BPF prog-id=23 op=UNLOAD Dec 13 01:54:30.820000 audit: BPF prog-id=34 op=LOAD Dec 13 01:54:30.820000 audit: BPF prog-id=35 op=LOAD Dec 13 01:54:30.820000 audit: BPF prog-id=21 op=UNLOAD Dec 13 01:54:30.820000 audit: BPF prog-id=22 op=UNLOAD Dec 13 01:54:30.824168 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 01:54:30.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.828559 systemd[1]: Starting audit-rules.service... Dec 13 01:54:30.830180 systemd[1]: Starting clean-ca-certificates.service... Dec 13 01:54:30.831992 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 01:54:30.832000 audit: BPF prog-id=36 op=LOAD Dec 13 01:54:30.834274 systemd[1]: Starting systemd-resolved.service... Dec 13 01:54:30.834000 audit: BPF prog-id=37 op=LOAD Dec 13 01:54:30.836541 systemd[1]: Starting systemd-timesyncd.service... Dec 13 01:54:30.838158 systemd[1]: Starting systemd-update-utmp.service... Dec 13 01:54:30.842463 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:30.842627 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.843766 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:54:30.845470 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:54:30.847299 systemd[1]: Starting modprobe@loop.service... Dec 13 01:54:30.848154 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.848396 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:54:30.848570 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:30.849962 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:54:30.850159 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:54:30.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.861341 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:54:30.861497 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:54:30.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.863013 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:54:30.863155 systemd[1]: Finished modprobe@loop.service. Dec 13 01:54:30.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.864596 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:54:30.864714 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.866825 systemd[1]: Finished clean-ca-certificates.service. Dec 13 01:54:30.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.867000 audit[1146]: SYSTEM_BOOT pid=1146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.870075 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:30.870424 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.871983 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:54:30.874116 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:54:30.876109 systemd[1]: Starting modprobe@loop.service... Dec 13 01:54:30.877046 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.877258 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:54:30.877480 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:54:30.877662 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:30.879432 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:54:30.879569 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:54:30.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.881158 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 01:54:30.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.882894 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:54:30.883037 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:54:30.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.884754 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:54:30.884917 systemd[1]: Finished modprobe@loop.service. Dec 13 01:54:30.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.890676 systemd[1]: Finished systemd-update-utmp.service. Dec 13 01:54:30.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:30.891000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:54:30.891000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc8b443b0 a2=420 a3=0 items=0 ppid=1141 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:30.891000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 01:54:30.892645 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:30.893051 augenrules[1167]: No rules Dec 13 01:54:30.892845 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.893889 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:54:30.895590 systemd[1]: Starting modprobe@drm.service... Dec 13 01:54:30.897344 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:54:30.899081 systemd[1]: Starting modprobe@loop.service... Dec 13 01:54:30.899942 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.900044 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:54:30.901142 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:54:30.902207 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:54:30.902298 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:54:30.903266 systemd[1]: Finished audit-rules.service. Dec 13 01:54:30.904743 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:54:30.904898 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:54:30.906098 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:54:30.906199 systemd[1]: Finished modprobe@drm.service. Dec 13 01:54:30.907498 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:54:30.907595 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:54:30.916791 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:54:30.916900 systemd[1]: Finished modprobe@loop.service. Dec 13 01:54:30.918508 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:54:30.918621 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:54:30.919678 systemd[1]: Finished ensure-sysext.service. Dec 13 01:54:30.992107 systemd[1]: Started systemd-timesyncd.service. Dec 13 01:54:32.188715 systemd-timesyncd[1145]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 01:54:32.188993 systemd[1]: Reached target time-set.target. Dec 13 01:54:32.189096 systemd-timesyncd[1145]: Initial clock synchronization to Fri 2024-12-13 01:54:32.188648 UTC. Dec 13 01:54:32.190788 systemd-resolved[1144]: Positive Trust Anchors: Dec 13 01:54:32.190799 systemd-resolved[1144]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:54:32.190826 systemd-resolved[1144]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:54:32.197276 systemd-resolved[1144]: Defaulting to hostname 'linux'. Dec 13 01:54:32.198554 systemd[1]: Started systemd-resolved.service. Dec 13 01:54:32.199501 systemd[1]: Reached target network.target. Dec 13 01:54:32.200299 systemd[1]: Reached target nss-lookup.target. Dec 13 01:54:32.201873 systemd[1]: Finished ldconfig.service. Dec 13 01:54:32.203853 systemd[1]: Starting systemd-update-done.service... Dec 13 01:54:32.279352 systemd-networkd[1038]: eth0: Gained IPv6LL Dec 13 01:54:32.279574 systemd[1]: Finished systemd-update-done.service. Dec 13 01:54:32.280761 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:54:32.281820 systemd[1]: Reached target network-online.target. Dec 13 01:54:32.282685 systemd[1]: Reached target sysinit.target. Dec 13 01:54:32.283619 systemd[1]: Started motdgen.path. Dec 13 01:54:32.286764 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 01:54:32.290249 systemd[1]: Started logrotate.timer. Dec 13 01:54:32.291058 systemd[1]: Started mdadm.timer. Dec 13 01:54:32.291743 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 01:54:32.292609 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 01:54:32.292635 systemd[1]: Reached target paths.target. Dec 13 01:54:32.293499 systemd[1]: Reached target timers.target. Dec 13 01:54:32.294633 systemd[1]: Listening on dbus.socket. Dec 13 01:54:32.296311 systemd[1]: Starting docker.socket... Dec 13 01:54:32.299998 systemd[1]: Listening on sshd.socket. Dec 13 01:54:32.300958 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:54:32.302327 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 01:54:32.302777 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 01:54:32.304012 systemd[1]: Listening on docker.socket. Dec 13 01:54:32.304878 systemd[1]: Reached target sockets.target. Dec 13 01:54:32.305667 systemd[1]: Reached target basic.target. Dec 13 01:54:32.306472 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:54:32.306498 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:54:32.307492 systemd[1]: Starting containerd.service... Dec 13 01:54:32.309035 systemd[1]: Starting dbus.service... Dec 13 01:54:32.311122 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 01:54:32.313085 systemd[1]: Starting extend-filesystems.service... Dec 13 01:54:32.314102 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 01:54:32.315094 systemd[1]: Starting kubelet.service... Dec 13 01:54:32.316823 systemd[1]: Starting motdgen.service... Dec 13 01:54:32.319830 jq[1183]: false Dec 13 01:54:32.318537 systemd[1]: Starting prepare-helm.service... Dec 13 01:54:32.320311 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 01:54:32.322033 systemd[1]: Starting sshd-keygen.service... Dec 13 01:54:32.324349 extend-filesystems[1184]: Found loop1 Dec 13 01:54:32.324349 extend-filesystems[1184]: Found sr0 Dec 13 01:54:32.324349 extend-filesystems[1184]: Found vda Dec 13 01:54:32.324349 extend-filesystems[1184]: Found vda1 Dec 13 01:54:32.324349 extend-filesystems[1184]: Found vda2 Dec 13 01:54:32.324349 extend-filesystems[1184]: Found vda3 Dec 13 01:54:32.324349 extend-filesystems[1184]: Found usr Dec 13 01:54:32.324349 extend-filesystems[1184]: Found vda4 Dec 13 01:54:32.324349 extend-filesystems[1184]: Found vda6 Dec 13 01:54:32.324349 extend-filesystems[1184]: Found vda7 Dec 13 01:54:32.324349 extend-filesystems[1184]: Found vda9 Dec 13 01:54:32.324349 extend-filesystems[1184]: Checking size of /dev/vda9 Dec 13 01:54:32.368349 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 01:54:32.324869 systemd[1]: Starting systemd-logind.service... Dec 13 01:54:32.339351 dbus-daemon[1182]: [system] SELinux support is enabled Dec 13 01:54:32.369665 extend-filesystems[1184]: Resized partition /dev/vda9 Dec 13 01:54:32.330994 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:54:32.372443 extend-filesystems[1218]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 01:54:32.331066 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 01:54:32.331509 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 01:54:32.373889 jq[1204]: true Dec 13 01:54:32.332138 systemd[1]: Starting update-engine.service... Dec 13 01:54:32.333646 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 01:54:32.337220 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 01:54:32.374259 tar[1207]: linux-amd64/helm Dec 13 01:54:32.337354 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 01:54:32.338628 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 01:54:32.374566 jq[1210]: true Dec 13 01:54:32.338771 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 01:54:32.339929 systemd[1]: Started dbus.service. Dec 13 01:54:32.343342 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 01:54:32.343362 systemd[1]: Reached target system-config.target. Dec 13 01:54:32.343826 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 01:54:32.343841 systemd[1]: Reached target user-config.target. Dec 13 01:54:32.356255 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 01:54:32.356390 systemd[1]: Finished motdgen.service. Dec 13 01:54:32.378816 update_engine[1203]: I1213 01:54:32.376929 1203 main.cc:92] Flatcar Update Engine starting Dec 13 01:54:32.379045 systemd[1]: Started update-engine.service. Dec 13 01:54:32.380064 update_engine[1203]: I1213 01:54:32.379127 1203 update_check_scheduler.cc:74] Next update check in 6m24s Dec 13 01:54:32.382568 systemd[1]: Started locksmithd.service. Dec 13 01:54:32.392334 systemd-logind[1195]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 01:54:32.392358 systemd-logind[1195]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 01:54:32.392512 systemd-logind[1195]: New seat seat0. Dec 13 01:54:32.393498 systemd[1]: Started systemd-logind.service. Dec 13 01:54:32.400210 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 01:54:32.423238 env[1208]: time="2024-12-13T01:54:32.418455287Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 01:54:32.423992 extend-filesystems[1218]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 01:54:32.423992 extend-filesystems[1218]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 01:54:32.423992 extend-filesystems[1218]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 01:54:32.430572 bash[1234]: Updated "/home/core/.ssh/authorized_keys" Dec 13 01:54:32.424234 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 01:54:32.430696 extend-filesystems[1184]: Resized filesystem in /dev/vda9 Dec 13 01:54:32.424363 systemd[1]: Finished extend-filesystems.service. Dec 13 01:54:32.429104 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 01:54:32.437457 env[1208]: time="2024-12-13T01:54:32.437420150Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 01:54:32.437558 env[1208]: time="2024-12-13T01:54:32.437536308Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:54:32.439232 env[1208]: time="2024-12-13T01:54:32.439199748Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:54:32.439232 env[1208]: time="2024-12-13T01:54:32.439230335Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:54:32.439441 env[1208]: time="2024-12-13T01:54:32.439417416Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:54:32.439441 env[1208]: time="2024-12-13T01:54:32.439437874Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 01:54:32.439502 env[1208]: time="2024-12-13T01:54:32.439449045Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 01:54:32.439502 env[1208]: time="2024-12-13T01:54:32.439457151Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 01:54:32.439539 env[1208]: time="2024-12-13T01:54:32.439511823Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:54:32.439720 env[1208]: time="2024-12-13T01:54:32.439687242Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:54:32.439842 env[1208]: time="2024-12-13T01:54:32.439815974Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:54:32.439842 env[1208]: time="2024-12-13T01:54:32.439838115Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 01:54:32.439904 env[1208]: time="2024-12-13T01:54:32.439894170Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 01:54:32.439931 env[1208]: time="2024-12-13T01:54:32.439907586Z" level=info msg="metadata content store policy set" policy=shared Dec 13 01:54:32.445291 env[1208]: time="2024-12-13T01:54:32.445262370Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 01:54:32.445348 env[1208]: time="2024-12-13T01:54:32.445302024Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 01:54:32.445348 env[1208]: time="2024-12-13T01:54:32.445313646Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 01:54:32.445348 env[1208]: time="2024-12-13T01:54:32.445336579Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 01:54:32.445411 env[1208]: time="2024-12-13T01:54:32.445348291Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 01:54:32.445411 env[1208]: time="2024-12-13T01:54:32.445359903Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 01:54:32.445411 env[1208]: time="2024-12-13T01:54:32.445369811Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 01:54:32.445411 env[1208]: time="2024-12-13T01:54:32.445384909Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 01:54:32.445411 env[1208]: time="2024-12-13T01:54:32.445395399Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 01:54:32.445411 env[1208]: time="2024-12-13T01:54:32.445405839Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 01:54:32.445520 env[1208]: time="2024-12-13T01:54:32.445416128Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 01:54:32.445520 env[1208]: time="2024-12-13T01:54:32.445425936Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 01:54:32.445520 env[1208]: time="2024-12-13T01:54:32.445511948Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 01:54:32.445593 env[1208]: time="2024-12-13T01:54:32.445573844Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 01:54:32.445792 env[1208]: time="2024-12-13T01:54:32.445775422Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 01:54:32.445832 env[1208]: time="2024-12-13T01:54:32.445798676Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.445832 env[1208]: time="2024-12-13T01:54:32.445808784Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 01:54:32.445878 env[1208]: time="2024-12-13T01:54:32.445842738Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.445878 env[1208]: time="2024-12-13T01:54:32.445853228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.445878 env[1208]: time="2024-12-13T01:54:32.445863297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.445878 env[1208]: time="2024-12-13T01:54:32.445872474Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.445951 env[1208]: time="2024-12-13T01:54:32.445882212Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.445951 env[1208]: time="2024-12-13T01:54:32.445891900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.445951 env[1208]: time="2024-12-13T01:54:32.445901458Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.445951 env[1208]: time="2024-12-13T01:54:32.445910656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.445951 env[1208]: time="2024-12-13T01:54:32.445922167Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 01:54:32.446046 env[1208]: time="2024-12-13T01:54:32.446011374Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.446046 env[1208]: time="2024-12-13T01:54:32.446023918Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.446046 env[1208]: time="2024-12-13T01:54:32.446034077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.446046 env[1208]: time="2024-12-13T01:54:32.446043014Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 01:54:32.446119 env[1208]: time="2024-12-13T01:54:32.446054806Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 01:54:32.446119 env[1208]: time="2024-12-13T01:54:32.446064204Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 01:54:32.446119 env[1208]: time="2024-12-13T01:54:32.446082618Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 01:54:32.446119 env[1208]: time="2024-12-13T01:54:32.446113827Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 01:54:32.446371 env[1208]: time="2024-12-13T01:54:32.446320925Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 01:54:32.446371 env[1208]: time="2024-12-13T01:54:32.446372662Z" level=info msg="Connect containerd service" Dec 13 01:54:32.448705 env[1208]: time="2024-12-13T01:54:32.446400394Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 01:54:32.448705 env[1208]: time="2024-12-13T01:54:32.446819540Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:54:32.448705 env[1208]: time="2024-12-13T01:54:32.447048089Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 01:54:32.448705 env[1208]: time="2024-12-13T01:54:32.447076713Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 01:54:32.448705 env[1208]: time="2024-12-13T01:54:32.447108142Z" level=info msg="containerd successfully booted in 0.055887s" Dec 13 01:54:32.447679 systemd[1]: Started containerd.service. Dec 13 01:54:32.454248 env[1208]: time="2024-12-13T01:54:32.454135904Z" level=info msg="Start subscribing containerd event" Dec 13 01:54:32.454606 env[1208]: time="2024-12-13T01:54:32.454343283Z" level=info msg="Start recovering state" Dec 13 01:54:32.454606 env[1208]: time="2024-12-13T01:54:32.454426910Z" level=info msg="Start event monitor" Dec 13 01:54:32.454606 env[1208]: time="2024-12-13T01:54:32.454447408Z" level=info msg="Start snapshots syncer" Dec 13 01:54:32.454606 env[1208]: time="2024-12-13T01:54:32.454462577Z" level=info msg="Start cni network conf syncer for default" Dec 13 01:54:32.454606 env[1208]: time="2024-12-13T01:54:32.454469940Z" level=info msg="Start streaming server" Dec 13 01:54:32.479610 locksmithd[1235]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 01:54:32.773914 tar[1207]: linux-amd64/LICENSE Dec 13 01:54:32.774104 tar[1207]: linux-amd64/README.md Dec 13 01:54:32.779119 systemd[1]: Finished prepare-helm.service. Dec 13 01:54:32.890501 sshd_keygen[1219]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 01:54:32.910035 systemd[1]: Finished sshd-keygen.service. Dec 13 01:54:32.912362 systemd[1]: Starting issuegen.service... Dec 13 01:54:32.917438 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 01:54:32.917599 systemd[1]: Finished issuegen.service. Dec 13 01:54:32.919910 systemd[1]: Starting systemd-user-sessions.service... Dec 13 01:54:32.925454 systemd[1]: Finished systemd-user-sessions.service. Dec 13 01:54:32.927820 systemd[1]: Started getty@tty1.service. Dec 13 01:54:32.929788 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 01:54:32.930866 systemd[1]: Reached target getty.target. Dec 13 01:54:33.012840 systemd[1]: Started kubelet.service. Dec 13 01:54:33.014140 systemd[1]: Reached target multi-user.target. Dec 13 01:54:33.016095 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 01:54:33.022554 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 01:54:33.022715 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 01:54:33.023846 systemd[1]: Startup finished in 592ms (kernel) + 4.439s (initrd) + 5.695s (userspace) = 10.728s. Dec 13 01:54:33.403650 kubelet[1266]: E1213 01:54:33.403586 1266 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:54:33.405288 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:54:33.405398 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:54:41.028320 systemd[1]: Created slice system-sshd.slice. Dec 13 01:54:41.029511 systemd[1]: Started sshd@0-10.0.0.101:22-10.0.0.1:34182.service. Dec 13 01:54:41.070908 sshd[1276]: Accepted publickey for core from 10.0.0.1 port 34182 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:54:41.072338 sshd[1276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:41.081037 systemd-logind[1195]: New session 1 of user core. Dec 13 01:54:41.081934 systemd[1]: Created slice user-500.slice. Dec 13 01:54:41.082929 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 01:54:41.090441 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 01:54:41.091666 systemd[1]: Starting user@500.service... Dec 13 01:54:41.094309 (systemd)[1279]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:41.161266 systemd[1279]: Queued start job for default target default.target. Dec 13 01:54:41.161636 systemd[1279]: Reached target paths.target. Dec 13 01:54:41.161653 systemd[1279]: Reached target sockets.target. Dec 13 01:54:41.161664 systemd[1279]: Reached target timers.target. Dec 13 01:54:41.161674 systemd[1279]: Reached target basic.target. Dec 13 01:54:41.161706 systemd[1279]: Reached target default.target. Dec 13 01:54:41.161725 systemd[1279]: Startup finished in 61ms. Dec 13 01:54:41.161857 systemd[1]: Started user@500.service. Dec 13 01:54:41.163088 systemd[1]: Started session-1.scope. Dec 13 01:54:41.212333 systemd[1]: Started sshd@1-10.0.0.101:22-10.0.0.1:34194.service. Dec 13 01:54:41.248597 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 34194 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:54:41.249675 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:41.253942 systemd-logind[1195]: New session 2 of user core. Dec 13 01:54:41.255164 systemd[1]: Started session-2.scope. Dec 13 01:54:41.310221 sshd[1288]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:41.313612 systemd[1]: sshd@1-10.0.0.101:22-10.0.0.1:34194.service: Deactivated successfully. Dec 13 01:54:41.314215 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 01:54:41.314718 systemd-logind[1195]: Session 2 logged out. Waiting for processes to exit. Dec 13 01:54:41.315937 systemd[1]: Started sshd@2-10.0.0.101:22-10.0.0.1:34202.service. Dec 13 01:54:41.316651 systemd-logind[1195]: Removed session 2. Dec 13 01:54:41.352231 sshd[1294]: Accepted publickey for core from 10.0.0.1 port 34202 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:54:41.353216 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:41.356401 systemd-logind[1195]: New session 3 of user core. Dec 13 01:54:41.357251 systemd[1]: Started session-3.scope. Dec 13 01:54:41.405979 sshd[1294]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:41.408525 systemd[1]: sshd@2-10.0.0.101:22-10.0.0.1:34202.service: Deactivated successfully. Dec 13 01:54:41.408990 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 01:54:41.409414 systemd-logind[1195]: Session 3 logged out. Waiting for processes to exit. Dec 13 01:54:41.410320 systemd[1]: Started sshd@3-10.0.0.101:22-10.0.0.1:34210.service. Dec 13 01:54:41.410867 systemd-logind[1195]: Removed session 3. Dec 13 01:54:41.447583 sshd[1300]: Accepted publickey for core from 10.0.0.1 port 34210 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:54:41.448732 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:41.451850 systemd-logind[1195]: New session 4 of user core. Dec 13 01:54:41.452694 systemd[1]: Started session-4.scope. Dec 13 01:54:41.505108 sshd[1300]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:41.508237 systemd[1]: sshd@3-10.0.0.101:22-10.0.0.1:34210.service: Deactivated successfully. Dec 13 01:54:41.508837 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 01:54:41.509375 systemd-logind[1195]: Session 4 logged out. Waiting for processes to exit. Dec 13 01:54:41.510409 systemd[1]: Started sshd@4-10.0.0.101:22-10.0.0.1:34212.service. Dec 13 01:54:41.511103 systemd-logind[1195]: Removed session 4. Dec 13 01:54:41.546269 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 34212 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:54:41.547333 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:41.550548 systemd-logind[1195]: New session 5 of user core. Dec 13 01:54:41.551480 systemd[1]: Started session-5.scope. Dec 13 01:54:41.606046 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 01:54:41.606232 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:41.616422 dbus-daemon[1182]: \xd0\u001d˭\x9bU: received setenforce notice (enforcing=1335290960) Dec 13 01:54:41.618444 sudo[1309]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:41.620386 sshd[1306]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:41.622968 systemd[1]: sshd@4-10.0.0.101:22-10.0.0.1:34212.service: Deactivated successfully. Dec 13 01:54:41.623449 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 01:54:41.623937 systemd-logind[1195]: Session 5 logged out. Waiting for processes to exit. Dec 13 01:54:41.624789 systemd[1]: Started sshd@5-10.0.0.101:22-10.0.0.1:34224.service. Dec 13 01:54:41.625362 systemd-logind[1195]: Removed session 5. Dec 13 01:54:41.662044 sshd[1313]: Accepted publickey for core from 10.0.0.1 port 34224 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:54:41.663285 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:41.666532 systemd-logind[1195]: New session 6 of user core. Dec 13 01:54:41.667218 systemd[1]: Started session-6.scope. Dec 13 01:54:41.722367 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 01:54:41.722615 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:41.725709 sudo[1317]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:41.729690 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 01:54:41.729871 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:41.737633 systemd[1]: Stopping audit-rules.service... Dec 13 01:54:41.737000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:54:41.738930 auditctl[1320]: No rules Dec 13 01:54:41.739112 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 01:54:41.739242 systemd[1]: Stopped audit-rules.service. Dec 13 01:54:41.739716 kernel: kauditd_printk_skb: 239 callbacks suppressed Dec 13 01:54:41.739755 kernel: audit: type=1305 audit(1734054881.737:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:54:41.740378 systemd[1]: Starting audit-rules.service... Dec 13 01:54:41.737000 audit[1320]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc99beaa00 a2=420 a3=0 items=0 ppid=1 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:41.745983 kernel: audit: type=1300 audit(1734054881.737:201): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc99beaa00 a2=420 a3=0 items=0 ppid=1 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:41.746066 kernel: audit: type=1327 audit(1734054881.737:201): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:54:41.737000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:54:41.747257 kernel: audit: type=1131 audit(1734054881.737:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.756150 augenrules[1337]: No rules Dec 13 01:54:41.756771 systemd[1]: Finished audit-rules.service. Dec 13 01:54:41.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.757556 sudo[1316]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:41.758659 sshd[1313]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:41.756000 audit[1316]: USER_END pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.762111 systemd[1]: sshd@5-10.0.0.101:22-10.0.0.1:34224.service: Deactivated successfully. Dec 13 01:54:41.762833 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 01:54:41.764547 kernel: audit: type=1130 audit(1734054881.755:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.764599 kernel: audit: type=1106 audit(1734054881.756:204): pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.764616 kernel: audit: type=1104 audit(1734054881.756:205): pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.756000 audit[1316]: CRED_DISP pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.765757 systemd[1]: Started sshd@6-10.0.0.101:22-10.0.0.1:34236.service. Dec 13 01:54:41.766207 systemd-logind[1195]: Session 6 logged out. Waiting for processes to exit. Dec 13 01:54:41.767240 systemd-logind[1195]: Removed session 6. Dec 13 01:54:41.758000 audit[1313]: USER_END pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:54:41.772150 kernel: audit: type=1106 audit(1734054881.758:206): pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:54:41.772277 kernel: audit: type=1104 audit(1734054881.758:207): pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:54:41.758000 audit[1313]: CRED_DISP pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:54:41.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.101:22-10.0.0.1:34224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.781003 kernel: audit: type=1131 audit(1734054881.761:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.101:22-10.0.0.1:34224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.101:22-10.0.0.1:34236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.807000 audit[1343]: USER_ACCT pid=1343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:54:41.809022 sshd[1343]: Accepted publickey for core from 10.0.0.1 port 34236 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:54:41.808000 audit[1343]: CRED_ACQ pid=1343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:54:41.808000 audit[1343]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd932c8a0 a2=3 a3=0 items=0 ppid=1 pid=1343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:41.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:54:41.810126 sshd[1343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:41.813663 systemd-logind[1195]: New session 7 of user core. Dec 13 01:54:41.814593 systemd[1]: Started session-7.scope. Dec 13 01:54:41.817000 audit[1343]: USER_START pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:54:41.818000 audit[1345]: CRED_ACQ pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:54:41.864000 audit[1346]: USER_ACCT pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.865000 audit[1346]: CRED_REFR pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.866162 sudo[1346]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 01:54:41.866349 sudo[1346]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:41.867000 audit[1346]: USER_START pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:41.885938 systemd[1]: Starting docker.service... Dec 13 01:54:41.919147 env[1358]: time="2024-12-13T01:54:41.919091245Z" level=info msg="Starting up" Dec 13 01:54:41.920525 env[1358]: time="2024-12-13T01:54:41.920485830Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:54:41.920525 env[1358]: time="2024-12-13T01:54:41.920516258Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:54:41.920588 env[1358]: time="2024-12-13T01:54:41.920539832Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:54:41.920588 env[1358]: time="2024-12-13T01:54:41.920551995Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:54:41.921962 env[1358]: time="2024-12-13T01:54:41.921932835Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:54:41.921962 env[1358]: time="2024-12-13T01:54:41.921951770Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:54:41.922035 env[1358]: time="2024-12-13T01:54:41.921964744Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:54:41.922035 env[1358]: time="2024-12-13T01:54:41.921973982Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:54:43.588215 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 01:54:43.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:43.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:43.588389 systemd[1]: Stopped kubelet.service. Dec 13 01:54:43.589646 systemd[1]: Starting kubelet.service... Dec 13 01:54:43.663486 systemd[1]: Started kubelet.service. Dec 13 01:54:43.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:43.696711 kubelet[1372]: E1213 01:54:43.696658 1372 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:54:43.699584 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:54:43.699718 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:54:43.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:54:44.900132 env[1358]: time="2024-12-13T01:54:44.900018422Z" level=info msg="Loading containers: start." Dec 13 01:54:44.954000 audit[1404]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:44.954000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc8c6e36b0 a2=0 a3=7ffc8c6e369c items=0 ppid=1358 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:44.954000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 01:54:44.955000 audit[1406]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:44.955000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe0fdb10c0 a2=0 a3=7ffe0fdb10ac items=0 ppid=1358 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:44.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 01:54:44.957000 audit[1408]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:44.957000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe2d829390 a2=0 a3=7ffe2d82937c items=0 ppid=1358 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:44.957000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:54:44.958000 audit[1410]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:44.958000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff4230fba0 a2=0 a3=7fff4230fb8c items=0 ppid=1358 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:44.958000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:54:44.960000 audit[1412]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:44.960000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff29134f90 a2=0 a3=7fff29134f7c items=0 ppid=1358 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:44.960000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 01:54:44.974000 audit[1417]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:44.974000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa4fb31c0 a2=0 a3=7fffa4fb31ac items=0 ppid=1358 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:44.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 01:54:45.233000 audit[1419]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.233000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff10d0d0a0 a2=0 a3=7fff10d0d08c items=0 ppid=1358 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 01:54:45.235000 audit[1421]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.235000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd69072f10 a2=0 a3=7ffd69072efc items=0 ppid=1358 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.235000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 01:54:45.237000 audit[1423]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.237000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcf7fbf190 a2=0 a3=7ffcf7fbf17c items=0 ppid=1358 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.237000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:54:45.245000 audit[1427]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.245000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc9a24b640 a2=0 a3=7ffc9a24b62c items=0 ppid=1358 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.245000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:54:45.254000 audit[1428]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.254000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe9d982d70 a2=0 a3=7ffe9d982d5c items=0 ppid=1358 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.254000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:54:45.264512 kernel: Initializing XFRM netlink socket Dec 13 01:54:45.296074 env[1358]: time="2024-12-13T01:54:45.296026821Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 01:54:45.312000 audit[1436]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.312000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd9b1b3060 a2=0 a3=7ffd9b1b304c items=0 ppid=1358 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.312000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 01:54:45.322000 audit[1439]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.322000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff3a5ffde0 a2=0 a3=7fff3a5ffdcc items=0 ppid=1358 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 01:54:45.324000 audit[1442]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.324000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe17078550 a2=0 a3=7ffe1707853c items=0 ppid=1358 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 01:54:45.326000 audit[1444]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.326000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdfa31c1c0 a2=0 a3=7ffdfa31c1ac items=0 ppid=1358 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 01:54:45.328000 audit[1446]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.328000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc15c1b0f0 a2=0 a3=7ffc15c1b0dc items=0 ppid=1358 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 01:54:45.329000 audit[1448]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.329000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc27cf0bc0 a2=0 a3=7ffc27cf0bac items=0 ppid=1358 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 01:54:45.331000 audit[1450]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.331000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe427ae6d0 a2=0 a3=7ffe427ae6bc items=0 ppid=1358 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.331000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 01:54:45.338000 audit[1453]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.338000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd23392d50 a2=0 a3=7ffd23392d3c items=0 ppid=1358 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 01:54:45.339000 audit[1455]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.339000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd3572e440 a2=0 a3=7ffd3572e42c items=0 ppid=1358 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:54:45.341000 audit[1457]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.341000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc7d3f6cc0 a2=0 a3=7ffc7d3f6cac items=0 ppid=1358 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:54:45.342000 audit[1459]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.342000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe76aa41f0 a2=0 a3=7ffe76aa41dc items=0 ppid=1358 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.342000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 01:54:45.344369 systemd-networkd[1038]: docker0: Link UP Dec 13 01:54:45.569000 audit[1463]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.569000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe605485c0 a2=0 a3=7ffe605485ac items=0 ppid=1358 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.569000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:54:45.574000 audit[1464]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:45.574000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdb045aff0 a2=0 a3=7ffdb045afdc items=0 ppid=1358 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.574000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:54:45.576451 env[1358]: time="2024-12-13T01:54:45.576413816Z" level=info msg="Loading containers: done." Dec 13 01:54:45.750732 env[1358]: time="2024-12-13T01:54:45.750688796Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 01:54:45.750929 env[1358]: time="2024-12-13T01:54:45.750911985Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 01:54:45.751029 env[1358]: time="2024-12-13T01:54:45.751017994Z" level=info msg="Daemon has completed initialization" Dec 13 01:54:45.842297 systemd[1]: Started docker.service. Dec 13 01:54:45.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.848636 env[1358]: time="2024-12-13T01:54:45.848575484Z" level=info msg="API listen on /run/docker.sock" Dec 13 01:54:46.661155 env[1208]: time="2024-12-13T01:54:46.661115527Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 01:54:48.872295 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3105218827.mount: Deactivated successfully. Dec 13 01:54:52.854365 env[1208]: time="2024-12-13T01:54:52.854294490Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:52.856144 env[1208]: time="2024-12-13T01:54:52.856096651Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:52.857853 env[1208]: time="2024-12-13T01:54:52.857817749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:52.859346 env[1208]: time="2024-12-13T01:54:52.859311240Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:52.860039 env[1208]: time="2024-12-13T01:54:52.860002347Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 01:54:52.861377 env[1208]: time="2024-12-13T01:54:52.861343703Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 01:54:53.838227 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 01:54:53.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:53.838416 systemd[1]: Stopped kubelet.service. Dec 13 01:54:53.839540 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 01:54:53.839582 kernel: audit: type=1130 audit(1734054893.837:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:53.840283 systemd[1]: Starting kubelet.service... Dec 13 01:54:53.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:53.846942 kernel: audit: type=1131 audit(1734054893.837:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:53.909086 systemd[1]: Started kubelet.service. Dec 13 01:54:53.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:53.914223 kernel: audit: type=1130 audit(1734054893.908:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:53.979077 kubelet[1505]: E1213 01:54:53.979022 1505 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:54:53.981069 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:54:53.981215 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:54:53.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:54:53.985221 kernel: audit: type=1131 audit(1734054893.980:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:54:55.316713 env[1208]: time="2024-12-13T01:54:55.316648873Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:55.318672 env[1208]: time="2024-12-13T01:54:55.318637904Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:55.322768 env[1208]: time="2024-12-13T01:54:55.322716484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:55.324662 env[1208]: time="2024-12-13T01:54:55.324630284Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:55.325409 env[1208]: time="2024-12-13T01:54:55.325377265Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 01:54:55.325865 env[1208]: time="2024-12-13T01:54:55.325843339Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 01:54:58.357649 env[1208]: time="2024-12-13T01:54:58.357575843Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:58.405975 env[1208]: time="2024-12-13T01:54:58.405906598Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:58.426569 env[1208]: time="2024-12-13T01:54:58.426518730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:58.438488 env[1208]: time="2024-12-13T01:54:58.438454639Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:58.439258 env[1208]: time="2024-12-13T01:54:58.439212560Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 01:54:58.439712 env[1208]: time="2024-12-13T01:54:58.439636195Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 01:55:00.618468 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1053016004.mount: Deactivated successfully. Dec 13 01:55:01.627352 env[1208]: time="2024-12-13T01:55:01.627295943Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:01.629623 env[1208]: time="2024-12-13T01:55:01.629594244Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:01.630951 env[1208]: time="2024-12-13T01:55:01.630879285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:01.632288 env[1208]: time="2024-12-13T01:55:01.632260856Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:01.632632 env[1208]: time="2024-12-13T01:55:01.632604020Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 01:55:01.633046 env[1208]: time="2024-12-13T01:55:01.633020431Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 01:55:02.150534 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3161541266.mount: Deactivated successfully. Dec 13 01:55:03.333870 env[1208]: time="2024-12-13T01:55:03.333800779Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:03.335708 env[1208]: time="2024-12-13T01:55:03.335651300Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:03.337426 env[1208]: time="2024-12-13T01:55:03.337397886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:03.339004 env[1208]: time="2024-12-13T01:55:03.338974904Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:03.339649 env[1208]: time="2024-12-13T01:55:03.339619603Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 01:55:03.340163 env[1208]: time="2024-12-13T01:55:03.340134980Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 01:55:03.925778 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1227632615.mount: Deactivated successfully. Dec 13 01:55:03.930931 env[1208]: time="2024-12-13T01:55:03.930882403Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:03.932662 env[1208]: time="2024-12-13T01:55:03.932632947Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:03.934061 env[1208]: time="2024-12-13T01:55:03.934016562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:03.935409 env[1208]: time="2024-12-13T01:55:03.935380029Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:03.935732 env[1208]: time="2024-12-13T01:55:03.935694369Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 01:55:03.936223 env[1208]: time="2024-12-13T01:55:03.936176323Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 01:55:04.088108 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 01:55:04.088284 systemd[1]: Stopped kubelet.service. Dec 13 01:55:04.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:04.089531 systemd[1]: Starting kubelet.service... Dec 13 01:55:04.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:04.095119 kernel: audit: type=1130 audit(1734054904.087:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:04.095172 kernel: audit: type=1131 audit(1734054904.087:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:04.164137 systemd[1]: Started kubelet.service. Dec 13 01:55:04.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:04.168205 kernel: audit: type=1130 audit(1734054904.163:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:04.196410 kubelet[1516]: E1213 01:55:04.196289 1516 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:55:04.197981 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:55:04.198094 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:55:04.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:55:04.202208 kernel: audit: type=1131 audit(1734054904.197:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:55:04.636153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2029469499.mount: Deactivated successfully. Dec 13 01:55:07.644820 env[1208]: time="2024-12-13T01:55:07.644749537Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:07.646605 env[1208]: time="2024-12-13T01:55:07.646572597Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:07.648416 env[1208]: time="2024-12-13T01:55:07.648363644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:07.650145 env[1208]: time="2024-12-13T01:55:07.650121739Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:07.650822 env[1208]: time="2024-12-13T01:55:07.650786138Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 01:55:09.687818 systemd[1]: Stopped kubelet.service. Dec 13 01:55:09.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:09.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:09.694666 kernel: audit: type=1130 audit(1734054909.686:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:09.694710 kernel: audit: type=1131 audit(1734054909.689:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:09.694957 systemd[1]: Starting kubelet.service... Dec 13 01:55:09.713638 systemd[1]: Reloading. Dec 13 01:55:09.776315 /usr/lib/systemd/system-generators/torcx-generator[1569]: time="2024-12-13T01:55:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:55:09.776344 /usr/lib/systemd/system-generators/torcx-generator[1569]: time="2024-12-13T01:55:09Z" level=info msg="torcx already run" Dec 13 01:55:10.075542 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:55:10.075558 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:55:10.092056 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:55:10.155814 kernel: audit: type=1400 audit(1734054910.144:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.155949 kernel: audit: type=1400 audit(1734054910.144:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.155973 kernel: audit: type=1400 audit(1734054910.144:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.159295 kernel: audit: type=1400 audit(1734054910.144:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.159344 kernel: audit: type=1400 audit(1734054910.144:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.162461 kernel: audit: type=1400 audit(1734054910.144:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.168768 kernel: audit: type=1400 audit(1734054910.144:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.168807 kernel: audit: type=1400 audit(1734054910.144:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.151000 audit: BPF prog-id=43 op=LOAD Dec 13 01:55:10.151000 audit: BPF prog-id=27 op=UNLOAD Dec 13 01:55:10.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit: BPF prog-id=44 op=LOAD Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.154000 audit: BPF prog-id=45 op=LOAD Dec 13 01:55:10.154000 audit: BPF prog-id=28 op=UNLOAD Dec 13 01:55:10.154000 audit: BPF prog-id=29 op=UNLOAD Dec 13 01:55:10.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit: BPF prog-id=46 op=LOAD Dec 13 01:55:10.158000 audit: BPF prog-id=41 op=UNLOAD Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.164000 audit: BPF prog-id=47 op=LOAD Dec 13 01:55:10.164000 audit: BPF prog-id=36 op=UNLOAD Dec 13 01:55:10.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.167000 audit: BPF prog-id=48 op=LOAD Dec 13 01:55:10.167000 audit: BPF prog-id=38 op=UNLOAD Dec 13 01:55:10.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit: BPF prog-id=49 op=LOAD Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.170000 audit: BPF prog-id=50 op=LOAD Dec 13 01:55:10.170000 audit: BPF prog-id=39 op=UNLOAD Dec 13 01:55:10.170000 audit: BPF prog-id=40 op=UNLOAD Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit: BPF prog-id=51 op=LOAD Dec 13 01:55:10.171000 audit: BPF prog-id=30 op=UNLOAD Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit: BPF prog-id=52 op=LOAD Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.171000 audit: BPF prog-id=53 op=LOAD Dec 13 01:55:10.171000 audit: BPF prog-id=31 op=UNLOAD Dec 13 01:55:10.171000 audit: BPF prog-id=32 op=UNLOAD Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit: BPF prog-id=54 op=LOAD Dec 13 01:55:10.172000 audit: BPF prog-id=33 op=UNLOAD Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit: BPF prog-id=55 op=LOAD Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit: BPF prog-id=56 op=LOAD Dec 13 01:55:10.173000 audit: BPF prog-id=34 op=UNLOAD Dec 13 01:55:10.173000 audit: BPF prog-id=35 op=UNLOAD Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.173000 audit: BPF prog-id=57 op=LOAD Dec 13 01:55:10.173000 audit: BPF prog-id=37 op=UNLOAD Dec 13 01:55:10.182970 systemd[1]: Started kubelet.service. Dec 13 01:55:10.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:10.185670 systemd[1]: Stopping kubelet.service... Dec 13 01:55:10.185998 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:55:10.186150 systemd[1]: Stopped kubelet.service. Dec 13 01:55:10.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:10.187455 systemd[1]: Starting kubelet.service... Dec 13 01:55:10.257135 systemd[1]: Started kubelet.service. Dec 13 01:55:10.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:10.286398 kubelet[1618]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:55:10.286398 kubelet[1618]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:55:10.286398 kubelet[1618]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:55:10.286733 kubelet[1618]: I1213 01:55:10.286436 1618 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:55:10.656639 kubelet[1618]: I1213 01:55:10.656587 1618 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 01:55:10.656639 kubelet[1618]: I1213 01:55:10.656622 1618 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:55:10.656866 kubelet[1618]: I1213 01:55:10.656844 1618 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 01:55:10.676255 kubelet[1618]: I1213 01:55:10.676215 1618 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:55:10.676602 kubelet[1618]: E1213 01:55:10.676575 1618 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.101:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:10.681899 kubelet[1618]: E1213 01:55:10.681869 1618 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 01:55:10.681899 kubelet[1618]: I1213 01:55:10.681897 1618 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 01:55:10.686100 kubelet[1618]: I1213 01:55:10.686077 1618 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:55:10.686196 kubelet[1618]: I1213 01:55:10.686157 1618 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 01:55:10.686297 kubelet[1618]: I1213 01:55:10.686269 1618 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:55:10.686437 kubelet[1618]: I1213 01:55:10.686292 1618 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 01:55:10.686517 kubelet[1618]: I1213 01:55:10.686442 1618 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:55:10.686517 kubelet[1618]: I1213 01:55:10.686450 1618 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 01:55:10.686566 kubelet[1618]: I1213 01:55:10.686529 1618 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:55:10.690072 kubelet[1618]: I1213 01:55:10.690055 1618 kubelet.go:408] "Attempting to sync node with API server" Dec 13 01:55:10.690072 kubelet[1618]: I1213 01:55:10.690073 1618 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:55:10.690132 kubelet[1618]: I1213 01:55:10.690110 1618 kubelet.go:314] "Adding apiserver pod source" Dec 13 01:55:10.690132 kubelet[1618]: I1213 01:55:10.690126 1618 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:55:10.707680 kubelet[1618]: W1213 01:55:10.707619 1618 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.101:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.101:6443: connect: connection refused Dec 13 01:55:10.707828 kubelet[1618]: E1213 01:55:10.707686 1618 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.101:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:10.712112 kubelet[1618]: I1213 01:55:10.712059 1618 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:55:10.718979 kubelet[1618]: I1213 01:55:10.718959 1618 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:55:10.719605 kubelet[1618]: W1213 01:55:10.719556 1618 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.101:6443: connect: connection refused Dec 13 01:55:10.719659 kubelet[1618]: E1213 01:55:10.719628 1618 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:10.723471 kubelet[1618]: W1213 01:55:10.723449 1618 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 01:55:10.723975 kubelet[1618]: I1213 01:55:10.723964 1618 server.go:1269] "Started kubelet" Dec 13 01:55:10.732326 kubelet[1618]: I1213 01:55:10.732290 1618 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:55:10.733696 kubelet[1618]: I1213 01:55:10.733635 1618 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:55:10.732000 audit[1618]: AVC avc: denied { mac_admin } for pid=1618 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.732000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:55:10.732000 audit[1618]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a10240 a1=c0009404f8 a2=c000a10210 a3=25 items=0 ppid=1 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:55:10.732000 audit[1618]: AVC avc: denied { mac_admin } for pid=1618 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:10.732000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:55:10.732000 audit[1618]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bd6400 a1=c000940510 a2=c000a102d0 a3=25 items=0 ppid=1 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:55:10.734386 kubelet[1618]: I1213 01:55:10.734101 1618 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:55:10.734386 kubelet[1618]: I1213 01:55:10.734133 1618 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:55:10.734386 kubelet[1618]: I1213 01:55:10.734322 1618 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 01:55:10.734954 kubelet[1618]: I1213 01:55:10.734927 1618 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:55:10.735171 kubelet[1618]: I1213 01:55:10.735156 1618 server.go:460] "Adding debug handlers to kubelet server" Dec 13 01:55:10.735332 kubelet[1618]: I1213 01:55:10.734178 1618 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:55:10.736653 kubelet[1618]: E1213 01:55:10.736518 1618 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 01:55:10.736653 kubelet[1618]: I1213 01:55:10.736631 1618 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 01:55:10.736742 kubelet[1618]: I1213 01:55:10.736713 1618 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 01:55:10.736767 kubelet[1618]: I1213 01:55:10.736746 1618 reconciler.go:26] "Reconciler: start to sync state" Dec 13 01:55:10.736815 kubelet[1618]: W1213 01:55:10.736786 1618 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.101:6443: connect: connection refused Dec 13 01:55:10.736856 kubelet[1618]: E1213 01:55:10.736822 1618 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:10.736948 kubelet[1618]: E1213 01:55:10.736917 1618 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.101:6443: connect: connection refused" interval="200ms" Dec 13 01:55:10.737203 kubelet[1618]: I1213 01:55:10.736974 1618 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:55:10.737203 kubelet[1618]: E1213 01:55:10.735990 1618 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.101:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.101:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.181099c0feb8f2f6 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 01:55:10.723945206 +0000 UTC m=+0.463877038,LastTimestamp:2024-12-13 01:55:10.723945206 +0000 UTC m=+0.463877038,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 01:55:10.737321 kubelet[1618]: E1213 01:55:10.737276 1618 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:55:10.737714 kubelet[1618]: I1213 01:55:10.737698 1618 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:55:10.737714 kubelet[1618]: I1213 01:55:10.737712 1618 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:55:10.738000 audit[1630]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:10.738000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc9e7a4f20 a2=0 a3=7ffc9e7a4f0c items=0 ppid=1618 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:55:10.739000 audit[1631]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:10.739000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc65d92d30 a2=0 a3=7ffc65d92d1c items=0 ppid=1618 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:55:10.740000 audit[1633]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:10.740000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcefb998e0 a2=0 a3=7ffcefb998cc items=0 ppid=1618 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:55:10.741000 audit[1635]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:10.741000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc85624c20 a2=0 a3=7ffc85624c0c items=0 ppid=1618 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:55:10.745823 kubelet[1618]: I1213 01:55:10.745797 1618 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:55:10.745823 kubelet[1618]: I1213 01:55:10.745812 1618 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:55:10.745823 kubelet[1618]: I1213 01:55:10.745824 1618 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:55:10.746000 audit[1640]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:10.746000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdd925be30 a2=0 a3=7ffdd925be1c items=0 ppid=1618 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 01:55:10.748029 kubelet[1618]: I1213 01:55:10.747983 1618 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:55:10.747000 audit[1641]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:10.747000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc43cbe80 a2=0 a3=7fffc43cbe6c items=0 ppid=1618 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:55:10.748790 kubelet[1618]: I1213 01:55:10.748767 1618 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:55:10.748823 kubelet[1618]: I1213 01:55:10.748791 1618 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:55:10.748823 kubelet[1618]: I1213 01:55:10.748809 1618 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 01:55:10.748868 kubelet[1618]: E1213 01:55:10.748839 1618 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:55:10.748000 audit[1643]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:10.748000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdaf26a530 a2=0 a3=7ffdaf26a51c items=0 ppid=1618 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:55:10.748000 audit[1645]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:10.748000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea266e3a0 a2=0 a3=7ffea266e38c items=0 ppid=1618 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:55:10.749000 audit[1649]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:10.749000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe9e536e40 a2=0 a3=7ffe9e536e2c items=0 ppid=1618 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:55:10.749000 audit[1648]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:10.749000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff88dd8750 a2=0 a3=10e3 items=0 ppid=1618 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:55:10.750000 audit[1650]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:10.750000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe6b848d70 a2=0 a3=7ffe6b848d5c items=0 ppid=1618 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:55:10.750000 audit[1651]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:10.750000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff639014a0 a2=0 a3=7fff6390148c items=0 ppid=1618 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:10.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:55:10.837538 kubelet[1618]: E1213 01:55:10.837500 1618 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 01:55:10.849663 kubelet[1618]: E1213 01:55:10.849634 1618 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 01:55:10.938003 kubelet[1618]: E1213 01:55:10.937912 1618 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 01:55:10.938163 kubelet[1618]: E1213 01:55:10.938135 1618 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.101:6443: connect: connection refused" interval="400ms" Dec 13 01:55:11.038476 kubelet[1618]: E1213 01:55:11.038421 1618 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 01:55:11.050623 kubelet[1618]: E1213 01:55:11.050583 1618 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 01:55:11.060368 kubelet[1618]: W1213 01:55:11.060320 1618 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.101:6443: connect: connection refused Dec 13 01:55:11.060441 kubelet[1618]: E1213 01:55:11.060378 1618 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:11.116891 kubelet[1618]: I1213 01:55:11.116844 1618 policy_none.go:49] "None policy: Start" Dec 13 01:55:11.117711 kubelet[1618]: I1213 01:55:11.117694 1618 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:55:11.117711 kubelet[1618]: I1213 01:55:11.117714 1618 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:55:11.131329 systemd[1]: Created slice kubepods.slice. Dec 13 01:55:11.134801 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 01:55:11.137081 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 01:55:11.138652 kubelet[1618]: E1213 01:55:11.138620 1618 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 01:55:11.144950 kubelet[1618]: I1213 01:55:11.144921 1618 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:55:11.143000 audit[1618]: AVC avc: denied { mac_admin } for pid=1618 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:11.143000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:55:11.143000 audit[1618]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ca9b90 a1=c000edaab0 a2=c000ca9b60 a3=25 items=0 ppid=1 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:11.143000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:55:11.145224 kubelet[1618]: I1213 01:55:11.144983 1618 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:55:11.145224 kubelet[1618]: I1213 01:55:11.145080 1618 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 01:55:11.145224 kubelet[1618]: I1213 01:55:11.145089 1618 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 01:55:11.145334 kubelet[1618]: I1213 01:55:11.145310 1618 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:55:11.146395 kubelet[1618]: E1213 01:55:11.146378 1618 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 01:55:11.247076 kubelet[1618]: I1213 01:55:11.246957 1618 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 01:55:11.247304 kubelet[1618]: E1213 01:55:11.247283 1618 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.101:6443/api/v1/nodes\": dial tcp 10.0.0.101:6443: connect: connection refused" node="localhost" Dec 13 01:55:11.338975 kubelet[1618]: E1213 01:55:11.338903 1618 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.101:6443: connect: connection refused" interval="800ms" Dec 13 01:55:11.448748 kubelet[1618]: I1213 01:55:11.448724 1618 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 01:55:11.449074 kubelet[1618]: E1213 01:55:11.449052 1618 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.101:6443/api/v1/nodes\": dial tcp 10.0.0.101:6443: connect: connection refused" node="localhost" Dec 13 01:55:11.456643 systemd[1]: Created slice kubepods-burstable-poda52b86ce975f496e6002ba953fa9b888.slice. Dec 13 01:55:11.475487 systemd[1]: Created slice kubepods-burstable-pod8bc78b0874ee795a9c02995423d52a59.slice. Dec 13 01:55:11.484102 systemd[1]: Created slice kubepods-burstable-pod50a9ae38ddb3bec3278d8dc73a6a7009.slice. Dec 13 01:55:11.540911 kubelet[1618]: I1213 01:55:11.540778 1618 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8bc78b0874ee795a9c02995423d52a59-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"8bc78b0874ee795a9c02995423d52a59\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:55:11.540911 kubelet[1618]: I1213 01:55:11.540833 1618 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8bc78b0874ee795a9c02995423d52a59-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"8bc78b0874ee795a9c02995423d52a59\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:55:11.540911 kubelet[1618]: I1213 01:55:11.540872 1618 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:11.540911 kubelet[1618]: I1213 01:55:11.540894 1618 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:11.541162 kubelet[1618]: I1213 01:55:11.540920 1618 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:11.541162 kubelet[1618]: I1213 01:55:11.540960 1618 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:11.541162 kubelet[1618]: I1213 01:55:11.540984 1618 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 01:55:11.541162 kubelet[1618]: I1213 01:55:11.541006 1618 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:11.541162 kubelet[1618]: I1213 01:55:11.541053 1618 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8bc78b0874ee795a9c02995423d52a59-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"8bc78b0874ee795a9c02995423d52a59\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:55:11.572279 kubelet[1618]: W1213 01:55:11.572204 1618 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.101:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.101:6443: connect: connection refused Dec 13 01:55:11.572279 kubelet[1618]: E1213 01:55:11.572276 1618 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.101:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:11.774377 kubelet[1618]: E1213 01:55:11.774343 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:11.774848 env[1208]: time="2024-12-13T01:55:11.774817557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,}" Dec 13 01:55:11.776939 kubelet[1618]: E1213 01:55:11.776897 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:11.777236 env[1208]: time="2024-12-13T01:55:11.777204425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:8bc78b0874ee795a9c02995423d52a59,Namespace:kube-system,Attempt:0,}" Dec 13 01:55:11.786406 kubelet[1618]: E1213 01:55:11.786369 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:11.786629 env[1208]: time="2024-12-13T01:55:11.786608633Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,}" Dec 13 01:55:11.850020 kubelet[1618]: I1213 01:55:11.849997 1618 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 01:55:11.850316 kubelet[1618]: E1213 01:55:11.850290 1618 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.101:6443/api/v1/nodes\": dial tcp 10.0.0.101:6443: connect: connection refused" node="localhost" Dec 13 01:55:11.895844 kubelet[1618]: W1213 01:55:11.895773 1618 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.101:6443: connect: connection refused Dec 13 01:55:11.895844 kubelet[1618]: E1213 01:55:11.895841 1618 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:12.025429 kubelet[1618]: W1213 01:55:12.025345 1618 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.101:6443: connect: connection refused Dec 13 01:55:12.025575 kubelet[1618]: E1213 01:55:12.025438 1618 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:12.139793 kubelet[1618]: E1213 01:55:12.139707 1618 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.101:6443: connect: connection refused" interval="1.6s" Dec 13 01:55:12.177398 kubelet[1618]: W1213 01:55:12.177346 1618 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.101:6443: connect: connection refused Dec 13 01:55:12.177458 kubelet[1618]: E1213 01:55:12.177393 1618 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:12.652240 kubelet[1618]: I1213 01:55:12.652206 1618 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 01:55:12.652633 kubelet[1618]: E1213 01:55:12.652541 1618 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.101:6443/api/v1/nodes\": dial tcp 10.0.0.101:6443: connect: connection refused" node="localhost" Dec 13 01:55:12.754606 kubelet[1618]: E1213 01:55:12.754538 1618 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.101:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.101:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:55:12.946892 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2119809062.mount: Deactivated successfully. Dec 13 01:55:12.952165 env[1208]: time="2024-12-13T01:55:12.952122850Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.954803 env[1208]: time="2024-12-13T01:55:12.954763998Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.955690 env[1208]: time="2024-12-13T01:55:12.955649592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.956650 env[1208]: time="2024-12-13T01:55:12.956610227Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.959734 env[1208]: time="2024-12-13T01:55:12.959687569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.960890 env[1208]: time="2024-12-13T01:55:12.960866483Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.962024 env[1208]: time="2024-12-13T01:55:12.961979801Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.963407 env[1208]: time="2024-12-13T01:55:12.963363816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.964446 env[1208]: time="2024-12-13T01:55:12.964420656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.965714 env[1208]: time="2024-12-13T01:55:12.965687077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.968032 env[1208]: time="2024-12-13T01:55:12.967983857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.969145 env[1208]: time="2024-12-13T01:55:12.969060785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:12.996602 env[1208]: time="2024-12-13T01:55:12.996521464Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:12.996728 env[1208]: time="2024-12-13T01:55:12.996605274Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:12.996728 env[1208]: time="2024-12-13T01:55:12.996628428Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:12.996836 env[1208]: time="2024-12-13T01:55:12.996796339Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a76e68877c49872e3f4547165de5e26c4913cb522e32839e00e636e5c7f96ca pid=1660 runtime=io.containerd.runc.v2 Dec 13 01:55:13.000573 env[1208]: time="2024-12-13T01:55:13.000513183Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:13.000573 env[1208]: time="2024-12-13T01:55:13.000548480Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:13.000573 env[1208]: time="2024-12-13T01:55:13.000558570Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:13.002266 env[1208]: time="2024-12-13T01:55:13.000699318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/859d850ae1ccd71309f9243da29309d55c86db918f650951bea7e44451eb07ce pid=1673 runtime=io.containerd.runc.v2 Dec 13 01:55:13.009628 env[1208]: time="2024-12-13T01:55:13.009545597Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:13.009694 env[1208]: time="2024-12-13T01:55:13.009653894Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:13.009694 env[1208]: time="2024-12-13T01:55:13.009676697Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:13.009862 env[1208]: time="2024-12-13T01:55:13.009826984Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e944f9994e9c70016b81acf429826bfa3e55b6cb2850f3904f8c0e2c16af3d62 pid=1684 runtime=io.containerd.runc.v2 Dec 13 01:55:13.031478 systemd[1]: Started cri-containerd-859d850ae1ccd71309f9243da29309d55c86db918f650951bea7e44451eb07ce.scope. Dec 13 01:55:13.098510 systemd[1]: Started cri-containerd-2a76e68877c49872e3f4547165de5e26c4913cb522e32839e00e636e5c7f96ca.scope. Dec 13 01:55:13.110521 systemd[1]: Started cri-containerd-e944f9994e9c70016b81acf429826bfa3e55b6cb2850f3904f8c0e2c16af3d62.scope. Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.147000 audit: BPF prog-id=58 op=LOAD Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=1673 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835396438353061653163636437313330396639323433646132393330 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=c items=0 ppid=1673 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835396438353061653163636437313330396639323433646132393330 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.148000 audit: BPF prog-id=59 op=LOAD Dec 13 01:55:13.148000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c000025320 items=0 ppid=1673 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835396438353061653163636437313330396639323433646132393330 Dec 13 01:55:13.149000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit: BPF prog-id=60 op=LOAD Dec 13 01:55:13.149000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.149000 audit: BPF prog-id=61 op=LOAD Dec 13 01:55:13.149000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c000025368 items=0 ppid=1673 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835396438353061653163636437313330396639323433646132393330 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1684 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466393939346539633730303136623831616366343239383236 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1684 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466393939346539633730303136623831616366343239383236 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit: BPF prog-id=62 op=LOAD Dec 13 01:55:13.150000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000284c30 items=0 ppid=1684 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466393939346539633730303136623831616366343239383236 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit: BPF prog-id=63 op=LOAD Dec 13 01:55:13.150000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000284c78 items=0 ppid=1684 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466393939346539633730303136623831616366343239383236 Dec 13 01:55:13.150000 audit: BPF prog-id=63 op=UNLOAD Dec 13 01:55:13.150000 audit: BPF prog-id=62 op=UNLOAD Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.150000 audit: BPF prog-id=64 op=LOAD Dec 13 01:55:13.150000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000285088 items=0 ppid=1684 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343466393939346539633730303136623831616366343239383236 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.151000 audit: BPF prog-id=65 op=LOAD Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1660 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261373665363838373763343938373265336634353437313635646535 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1660 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261373665363838373763343938373265336634353437313635646535 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit: BPF prog-id=61 op=UNLOAD Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit: BPF prog-id=66 op=LOAD Dec 13 01:55:13.152000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c0e10 items=0 ppid=1660 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261373665363838373763343938373265336634353437313635646535 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.152000 audit: BPF prog-id=67 op=LOAD Dec 13 01:55:13.152000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c0e58 items=0 ppid=1660 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261373665363838373763343938373265336634353437313635646535 Dec 13 01:55:13.153000 audit: BPF prog-id=67 op=UNLOAD Dec 13 01:55:13.153000 audit: BPF prog-id=66 op=UNLOAD Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { perfmon } for pid=1683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit[1683]: AVC avc: denied { bpf } for pid=1683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.153000 audit: BPF prog-id=68 op=LOAD Dec 13 01:55:13.153000 audit[1683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c1268 items=0 ppid=1660 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261373665363838373763343938373265336634353437313635646535 Dec 13 01:55:13.154000 audit: BPF prog-id=59 op=UNLOAD Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.154000 audit: BPF prog-id=69 op=LOAD Dec 13 01:55:13.154000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c000025778 items=0 ppid=1673 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835396438353061653163636437313330396639323433646132393330 Dec 13 01:55:13.217122 env[1208]: time="2024-12-13T01:55:13.216978697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:8bc78b0874ee795a9c02995423d52a59,Namespace:kube-system,Attempt:0,} returns sandbox id \"2a76e68877c49872e3f4547165de5e26c4913cb522e32839e00e636e5c7f96ca\"" Dec 13 01:55:13.217291 env[1208]: time="2024-12-13T01:55:13.217010347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,} returns sandbox id \"e944f9994e9c70016b81acf429826bfa3e55b6cb2850f3904f8c0e2c16af3d62\"" Dec 13 01:55:13.218290 kubelet[1618]: E1213 01:55:13.218262 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:13.219270 kubelet[1618]: E1213 01:55:13.218629 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:13.220603 env[1208]: time="2024-12-13T01:55:13.220564292Z" level=info msg="CreateContainer within sandbox \"2a76e68877c49872e3f4547165de5e26c4913cb522e32839e00e636e5c7f96ca\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 01:55:13.220725 env[1208]: time="2024-12-13T01:55:13.220701775Z" level=info msg="CreateContainer within sandbox \"e944f9994e9c70016b81acf429826bfa3e55b6cb2850f3904f8c0e2c16af3d62\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 01:55:13.222138 env[1208]: time="2024-12-13T01:55:13.222111786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,} returns sandbox id \"859d850ae1ccd71309f9243da29309d55c86db918f650951bea7e44451eb07ce\"" Dec 13 01:55:13.223092 kubelet[1618]: E1213 01:55:13.223069 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:13.224643 env[1208]: time="2024-12-13T01:55:13.224600989Z" level=info msg="CreateContainer within sandbox \"859d850ae1ccd71309f9243da29309d55c86db918f650951bea7e44451eb07ce\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 01:55:13.238585 env[1208]: time="2024-12-13T01:55:13.238554900Z" level=info msg="CreateContainer within sandbox \"e944f9994e9c70016b81acf429826bfa3e55b6cb2850f3904f8c0e2c16af3d62\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ed09e94580f234df8ccb0f65450c6016704e292025f4728a3c1188ef3f4ace18\"" Dec 13 01:55:13.240609 env[1208]: time="2024-12-13T01:55:13.240364665Z" level=info msg="StartContainer for \"ed09e94580f234df8ccb0f65450c6016704e292025f4728a3c1188ef3f4ace18\"" Dec 13 01:55:13.253639 env[1208]: time="2024-12-13T01:55:13.253593151Z" level=info msg="CreateContainer within sandbox \"2a76e68877c49872e3f4547165de5e26c4913cb522e32839e00e636e5c7f96ca\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"42f22000a4bde436771d186a12d8cd9444ecba6fffcdd7d1d069ad67b8da98b9\"" Dec 13 01:55:13.254140 env[1208]: time="2024-12-13T01:55:13.254085621Z" level=info msg="StartContainer for \"42f22000a4bde436771d186a12d8cd9444ecba6fffcdd7d1d069ad67b8da98b9\"" Dec 13 01:55:13.254291 env[1208]: time="2024-12-13T01:55:13.254262057Z" level=info msg="CreateContainer within sandbox \"859d850ae1ccd71309f9243da29309d55c86db918f650951bea7e44451eb07ce\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ee7adc92edf1ec6f1f6578a2bd8f93659f863b43c1f85d53266f82de102b38f8\"" Dec 13 01:55:13.254708 env[1208]: time="2024-12-13T01:55:13.254662132Z" level=info msg="StartContainer for \"ee7adc92edf1ec6f1f6578a2bd8f93659f863b43c1f85d53266f82de102b38f8\"" Dec 13 01:55:13.260871 systemd[1]: Started cri-containerd-ed09e94580f234df8ccb0f65450c6016704e292025f4728a3c1188ef3f4ace18.scope. Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.272000 audit: BPF prog-id=70 op=LOAD Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1684 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564303965393435383066323334646638636362306636353435306336 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1684 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564303965393435383066323334646638636362306636353435306336 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit: BPF prog-id=71 op=LOAD Dec 13 01:55:13.273000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002831f0 items=0 ppid=1684 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564303965393435383066323334646638636362306636353435306336 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit: BPF prog-id=72 op=LOAD Dec 13 01:55:13.273000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000283238 items=0 ppid=1684 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564303965393435383066323334646638636362306636353435306336 Dec 13 01:55:13.273000 audit: BPF prog-id=72 op=UNLOAD Dec 13 01:55:13.273000 audit: BPF prog-id=71 op=UNLOAD Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.273000 audit: BPF prog-id=73 op=LOAD Dec 13 01:55:13.273000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000283648 items=0 ppid=1684 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564303965393435383066323334646638636362306636353435306336 Dec 13 01:55:13.276806 systemd[1]: Started cri-containerd-ee7adc92edf1ec6f1f6578a2bd8f93659f863b43c1f85d53266f82de102b38f8.scope. Dec 13 01:55:13.281256 systemd[1]: Started cri-containerd-42f22000a4bde436771d186a12d8cd9444ecba6fffcdd7d1d069ad67b8da98b9.scope. Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.293000 audit: BPF prog-id=74 op=LOAD Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1673 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565376164633932656466316563366631663635373861326264386639 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1673 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565376164633932656466316563366631663635373861326264386639 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.294000 audit: BPF prog-id=75 op=LOAD Dec 13 01:55:13.294000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030afe0 items=0 ppid=1673 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565376164633932656466316563366631663635373861326264386639 Dec 13 01:55:13.295000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.295000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.295000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.295000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.295000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.295000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.295000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.295000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.295000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.295000 audit: BPF prog-id=76 op=LOAD Dec 13 01:55:13.295000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030b028 items=0 ppid=1673 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565376164633932656466316563366631663635373861326264386639 Dec 13 01:55:13.296000 audit: BPF prog-id=76 op=UNLOAD Dec 13 01:55:13.296000 audit: BPF prog-id=75 op=UNLOAD Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit: BPF prog-id=77 op=LOAD Dec 13 01:55:13.296000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.296000 audit: BPF prog-id=78 op=LOAD Dec 13 01:55:13.296000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030b438 items=0 ppid=1673 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565376164633932656466316563366631663635373861326264386639 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1660 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663232303030613462646534333637373164313836613132643863 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1660 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663232303030613462646534333637373164313836613132643863 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.297000 audit: BPF prog-id=79 op=LOAD Dec 13 01:55:13.297000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000219270 items=0 ppid=1660 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663232303030613462646534333637373164313836613132643863 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit: BPF prog-id=80 op=LOAD Dec 13 01:55:13.298000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002192b8 items=0 ppid=1660 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663232303030613462646534333637373164313836613132643863 Dec 13 01:55:13.298000 audit: BPF prog-id=80 op=UNLOAD Dec 13 01:55:13.298000 audit: BPF prog-id=79 op=UNLOAD Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:13.298000 audit: BPF prog-id=81 op=LOAD Dec 13 01:55:13.298000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002196c8 items=0 ppid=1660 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:13.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432663232303030613462646534333637373164313836613132643863 Dec 13 01:55:13.314036 env[1208]: time="2024-12-13T01:55:13.313995260Z" level=info msg="StartContainer for \"ed09e94580f234df8ccb0f65450c6016704e292025f4728a3c1188ef3f4ace18\" returns successfully" Dec 13 01:55:13.326926 env[1208]: time="2024-12-13T01:55:13.326885009Z" level=info msg="StartContainer for \"42f22000a4bde436771d186a12d8cd9444ecba6fffcdd7d1d069ad67b8da98b9\" returns successfully" Dec 13 01:55:13.328386 env[1208]: time="2024-12-13T01:55:13.328360787Z" level=info msg="StartContainer for \"ee7adc92edf1ec6f1f6578a2bd8f93659f863b43c1f85d53266f82de102b38f8\" returns successfully" Dec 13 01:55:13.755870 kubelet[1618]: E1213 01:55:13.755843 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:13.757629 kubelet[1618]: E1213 01:55:13.757616 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:13.758858 kubelet[1618]: E1213 01:55:13.758846 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:13.983000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:13.983000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:13.983000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b28020 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:13.983000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:13.983000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f26000 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:13.983000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:14.254913 kubelet[1618]: I1213 01:55:14.254608 1618 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 01:55:14.685000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:14.685000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0052d6640 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:55:14.685000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:55:14.685000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:14.685000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c003a6a9f0 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:55:14.685000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:55:14.686000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:14.686000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005f8c510 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:55:14.686000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:55:14.688000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:14.689291 kernel: kauditd_printk_skb: 582 callbacks suppressed Dec 13 01:55:14.689345 kernel: audit: type=1400 audit(1734054914.688:555): avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:14.688000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c0052d6940 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:55:14.688000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:55:14.711091 kernel: audit: type=1300 audit(1734054914.688:555): arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c0052d6940 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:55:14.711231 kernel: audit: type=1327 audit(1734054914.688:555): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:55:14.688000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:14.719836 kernel: audit: type=1400 audit(1734054914.688:556): avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:14.719949 kernel: audit: type=1300 audit(1734054914.688:556): arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c0031a8180 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:55:14.688000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c0031a8180 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:55:14.724266 kernel: audit: type=1327 audit(1734054914.688:556): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:55:14.688000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:55:14.728424 kernel: audit: type=1400 audit(1734054914.688:557): avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:14.688000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:14.728493 kubelet[1618]: E1213 01:55:14.726301 1618 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 01:55:14.733315 kernel: audit: type=1300 audit(1734054914.688:557): arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c003091500 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:55:14.688000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c003091500 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:55:14.737364 kernel: audit: type=1327 audit(1734054914.688:557): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:55:14.688000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:55:14.761395 kubelet[1618]: E1213 01:55:14.761360 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:14.761665 kubelet[1618]: E1213 01:55:14.761599 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:15.135837 kubelet[1618]: I1213 01:55:15.135789 1618 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 01:55:15.700394 kubelet[1618]: I1213 01:55:15.700341 1618 apiserver.go:52] "Watching apiserver" Dec 13 01:55:15.737108 kubelet[1618]: I1213 01:55:15.737063 1618 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 01:55:16.695817 systemd[1]: Reloading. Dec 13 01:55:16.760765 /usr/lib/systemd/system-generators/torcx-generator[1915]: time="2024-12-13T01:55:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:55:16.760791 /usr/lib/systemd/system-generators/torcx-generator[1915]: time="2024-12-13T01:55:16Z" level=info msg="torcx already run" Dec 13 01:55:16.810424 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:55:16.810441 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:55:16.826823 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:55:16.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit: BPF prog-id=82 op=LOAD Dec 13 01:55:16.895000 audit: BPF prog-id=65 op=UNLOAD Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896220 kernel: audit: type=1400 audit(1734054916.892:558): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit: BPF prog-id=83 op=LOAD Dec 13 01:55:16.896000 audit: BPF prog-id=43 op=UNLOAD Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit: BPF prog-id=84 op=LOAD Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.896000 audit: BPF prog-id=85 op=LOAD Dec 13 01:55:16.896000 audit: BPF prog-id=44 op=UNLOAD Dec 13 01:55:16.896000 audit: BPF prog-id=45 op=UNLOAD Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.898000 audit: BPF prog-id=86 op=LOAD Dec 13 01:55:16.898000 audit: BPF prog-id=46 op=UNLOAD Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.899000 audit: BPF prog-id=87 op=LOAD Dec 13 01:55:16.899000 audit: BPF prog-id=58 op=UNLOAD Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.900000 audit: BPF prog-id=88 op=LOAD Dec 13 01:55:16.900000 audit: BPF prog-id=47 op=UNLOAD Dec 13 01:55:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit: BPF prog-id=89 op=LOAD Dec 13 01:55:16.901000 audit: BPF prog-id=48 op=UNLOAD Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit: BPF prog-id=90 op=LOAD Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit: BPF prog-id=91 op=LOAD Dec 13 01:55:16.901000 audit: BPF prog-id=49 op=UNLOAD Dec 13 01:55:16.901000 audit: BPF prog-id=50 op=UNLOAD Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit: BPF prog-id=92 op=LOAD Dec 13 01:55:16.902000 audit: BPF prog-id=77 op=UNLOAD Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit: BPF prog-id=93 op=LOAD Dec 13 01:55:16.902000 audit: BPF prog-id=70 op=UNLOAD Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit: BPF prog-id=94 op=LOAD Dec 13 01:55:16.903000 audit: BPF prog-id=51 op=UNLOAD Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit: BPF prog-id=95 op=LOAD Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.903000 audit: BPF prog-id=96 op=LOAD Dec 13 01:55:16.903000 audit: BPF prog-id=52 op=UNLOAD Dec 13 01:55:16.903000 audit: BPF prog-id=53 op=UNLOAD Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit: BPF prog-id=97 op=LOAD Dec 13 01:55:16.904000 audit: BPF prog-id=54 op=UNLOAD Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.904000 audit: BPF prog-id=98 op=LOAD Dec 13 01:55:16.904000 audit: BPF prog-id=74 op=UNLOAD Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit: BPF prog-id=99 op=LOAD Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit: BPF prog-id=100 op=LOAD Dec 13 01:55:16.905000 audit: BPF prog-id=55 op=UNLOAD Dec 13 01:55:16.905000 audit: BPF prog-id=56 op=UNLOAD Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.905000 audit: BPF prog-id=101 op=LOAD Dec 13 01:55:16.905000 audit: BPF prog-id=57 op=UNLOAD Dec 13 01:55:16.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:16.907000 audit: BPF prog-id=102 op=LOAD Dec 13 01:55:16.907000 audit: BPF prog-id=60 op=UNLOAD Dec 13 01:55:16.917441 systemd[1]: Stopping kubelet.service... Dec 13 01:55:16.940495 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:55:16.940659 systemd[1]: Stopped kubelet.service. Dec 13 01:55:16.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:16.942162 systemd[1]: Starting kubelet.service... Dec 13 01:55:17.020243 systemd[1]: Started kubelet.service. Dec 13 01:55:17.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:17.054539 kubelet[1959]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:55:17.054539 kubelet[1959]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:55:17.054539 kubelet[1959]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:55:17.054888 kubelet[1959]: I1213 01:55:17.054572 1959 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:55:17.059644 kubelet[1959]: I1213 01:55:17.059598 1959 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 01:55:17.059644 kubelet[1959]: I1213 01:55:17.059628 1959 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:55:17.059896 kubelet[1959]: I1213 01:55:17.059873 1959 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 01:55:17.061616 kubelet[1959]: I1213 01:55:17.061577 1959 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 01:55:17.064018 kubelet[1959]: I1213 01:55:17.063983 1959 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:55:17.067078 kubelet[1959]: E1213 01:55:17.067047 1959 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 01:55:17.067125 kubelet[1959]: I1213 01:55:17.067080 1959 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 01:55:17.069754 kubelet[1959]: I1213 01:55:17.069732 1959 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:55:17.069829 kubelet[1959]: I1213 01:55:17.069810 1959 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 01:55:17.069920 kubelet[1959]: I1213 01:55:17.069892 1959 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:55:17.070084 kubelet[1959]: I1213 01:55:17.069915 1959 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 01:55:17.070084 kubelet[1959]: I1213 01:55:17.070079 1959 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:55:17.070084 kubelet[1959]: I1213 01:55:17.070087 1959 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 01:55:17.070235 kubelet[1959]: I1213 01:55:17.070114 1959 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:55:17.070235 kubelet[1959]: I1213 01:55:17.070200 1959 kubelet.go:408] "Attempting to sync node with API server" Dec 13 01:55:17.070235 kubelet[1959]: I1213 01:55:17.070210 1959 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:55:17.070235 kubelet[1959]: I1213 01:55:17.070230 1959 kubelet.go:314] "Adding apiserver pod source" Dec 13 01:55:17.070318 kubelet[1959]: I1213 01:55:17.070242 1959 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:55:17.071664 kubelet[1959]: I1213 01:55:17.071615 1959 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:55:17.071995 kubelet[1959]: I1213 01:55:17.071952 1959 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:55:17.072390 kubelet[1959]: I1213 01:55:17.072374 1959 server.go:1269] "Started kubelet" Dec 13 01:55:17.074000 audit[1959]: AVC avc: denied { mac_admin } for pid=1959 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:17.074000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:55:17.074000 audit[1959]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bd45a0 a1=c0004ed530 a2=c000bd4570 a3=25 items=0 ppid=1 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:17.074000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:55:17.074000 audit[1959]: AVC avc: denied { mac_admin } for pid=1959 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:17.074000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:55:17.074000 audit[1959]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000729ce0 a1=c0004ed548 a2=c000bd4630 a3=25 items=0 ppid=1 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:17.074000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:55:17.075009 kubelet[1959]: I1213 01:55:17.074468 1959 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:55:17.075009 kubelet[1959]: I1213 01:55:17.074514 1959 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:55:17.075009 kubelet[1959]: I1213 01:55:17.074542 1959 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:55:17.075009 kubelet[1959]: I1213 01:55:17.074825 1959 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:55:17.078710 kubelet[1959]: I1213 01:55:17.076097 1959 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:55:17.078710 kubelet[1959]: I1213 01:55:17.076440 1959 server.go:460] "Adding debug handlers to kubelet server" Dec 13 01:55:17.079708 kubelet[1959]: I1213 01:55:17.079665 1959 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 01:55:17.081502 kubelet[1959]: I1213 01:55:17.081119 1959 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:55:17.082381 kubelet[1959]: I1213 01:55:17.082354 1959 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:55:17.083747 kubelet[1959]: I1213 01:55:17.083696 1959 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 01:55:17.083861 kubelet[1959]: E1213 01:55:17.083831 1959 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 01:55:17.085857 kubelet[1959]: I1213 01:55:17.085824 1959 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:55:17.087978 kubelet[1959]: I1213 01:55:17.087926 1959 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 01:55:17.088738 kubelet[1959]: I1213 01:55:17.088725 1959 reconciler.go:26] "Reconciler: start to sync state" Dec 13 01:55:17.088846 kubelet[1959]: I1213 01:55:17.088730 1959 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:55:17.089576 kubelet[1959]: E1213 01:55:17.089541 1959 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:55:17.105855 kubelet[1959]: I1213 01:55:17.104483 1959 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:55:17.105855 kubelet[1959]: I1213 01:55:17.105513 1959 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:55:17.105855 kubelet[1959]: I1213 01:55:17.105538 1959 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:55:17.105855 kubelet[1959]: I1213 01:55:17.105557 1959 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 01:55:17.105855 kubelet[1959]: E1213 01:55:17.105598 1959 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:55:17.122474 kubelet[1959]: I1213 01:55:17.122451 1959 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:55:17.122474 kubelet[1959]: I1213 01:55:17.122469 1959 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:55:17.122593 kubelet[1959]: I1213 01:55:17.122486 1959 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:55:17.122619 kubelet[1959]: I1213 01:55:17.122595 1959 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 01:55:17.122619 kubelet[1959]: I1213 01:55:17.122604 1959 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 01:55:17.122619 kubelet[1959]: I1213 01:55:17.122620 1959 policy_none.go:49] "None policy: Start" Dec 13 01:55:17.123155 kubelet[1959]: I1213 01:55:17.123135 1959 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:55:17.123223 kubelet[1959]: I1213 01:55:17.123162 1959 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:55:17.123360 kubelet[1959]: I1213 01:55:17.123339 1959 state_mem.go:75] "Updated machine memory state" Dec 13 01:55:17.127518 kubelet[1959]: I1213 01:55:17.127495 1959 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:55:17.127000 audit[1959]: AVC avc: denied { mac_admin } for pid=1959 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:17.127000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:55:17.127000 audit[1959]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011f7110 a1=c001209cc8 a2=c0011f70e0 a3=25 items=0 ppid=1 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:17.127000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:55:17.127745 kubelet[1959]: I1213 01:55:17.127560 1959 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:55:17.127745 kubelet[1959]: I1213 01:55:17.127688 1959 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 01:55:17.127745 kubelet[1959]: I1213 01:55:17.127698 1959 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 01:55:17.128023 kubelet[1959]: I1213 01:55:17.127997 1959 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:55:17.232296 kubelet[1959]: I1213 01:55:17.232259 1959 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 01:55:17.240696 kubelet[1959]: I1213 01:55:17.240660 1959 kubelet_node_status.go:111] "Node was previously registered" node="localhost" Dec 13 01:55:17.240862 kubelet[1959]: I1213 01:55:17.240746 1959 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 01:55:17.290747 kubelet[1959]: I1213 01:55:17.290608 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8bc78b0874ee795a9c02995423d52a59-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"8bc78b0874ee795a9c02995423d52a59\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:55:17.290747 kubelet[1959]: I1213 01:55:17.290644 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:17.290747 kubelet[1959]: I1213 01:55:17.290664 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:17.290747 kubelet[1959]: I1213 01:55:17.290681 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:17.290747 kubelet[1959]: I1213 01:55:17.290697 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8bc78b0874ee795a9c02995423d52a59-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"8bc78b0874ee795a9c02995423d52a59\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:55:17.291044 kubelet[1959]: I1213 01:55:17.290709 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:17.291044 kubelet[1959]: I1213 01:55:17.290725 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 01:55:17.292410 kubelet[1959]: I1213 01:55:17.292381 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 01:55:17.292554 kubelet[1959]: I1213 01:55:17.292522 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8bc78b0874ee795a9c02995423d52a59-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"8bc78b0874ee795a9c02995423d52a59\") " pod="kube-system/kube-apiserver-localhost" Dec 13 01:55:17.296423 update_engine[1203]: I1213 01:55:17.296386 1203 update_attempter.cc:509] Updating boot flags... Dec 13 01:55:17.517294 kubelet[1959]: E1213 01:55:17.517247 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:17.517437 kubelet[1959]: E1213 01:55:17.517333 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:17.517437 kubelet[1959]: E1213 01:55:17.517379 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:18.075342 kubelet[1959]: I1213 01:55:18.075311 1959 apiserver.go:52] "Watching apiserver" Dec 13 01:55:18.088381 kubelet[1959]: I1213 01:55:18.088353 1959 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 01:55:18.115140 kubelet[1959]: E1213 01:55:18.114857 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:18.115140 kubelet[1959]: E1213 01:55:18.114948 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:18.115140 kubelet[1959]: E1213 01:55:18.115075 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:18.341341 kubelet[1959]: I1213 01:55:18.341286 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.3412693500000001 podStartE2EDuration="1.34126935s" podCreationTimestamp="2024-12-13 01:55:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:55:18.160478154 +0000 UTC m=+1.137179983" watchObservedRunningTime="2024-12-13 01:55:18.34126935 +0000 UTC m=+1.317971149" Dec 13 01:55:18.359425 kubelet[1959]: I1213 01:55:18.359367 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.359340043 podStartE2EDuration="1.359340043s" podCreationTimestamp="2024-12-13 01:55:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:55:18.34109589 +0000 UTC m=+1.317797709" watchObservedRunningTime="2024-12-13 01:55:18.359340043 +0000 UTC m=+1.336041842" Dec 13 01:55:18.369118 kubelet[1959]: I1213 01:55:18.369060 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.3690464150000001 podStartE2EDuration="1.369046415s" podCreationTimestamp="2024-12-13 01:55:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:55:18.359501059 +0000 UTC m=+1.336202858" watchObservedRunningTime="2024-12-13 01:55:18.369046415 +0000 UTC m=+1.345748214" Dec 13 01:55:19.115916 kubelet[1959]: E1213 01:55:19.115873 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:19.384000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 01:55:19.384000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000514140 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:19.384000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:20.116972 kubelet[1959]: E1213 01:55:20.116931 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:20.931000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:20.933244 kernel: kauditd_printk_skb: 260 callbacks suppressed Dec 13 01:55:20.933380 kernel: audit: type=1400 audit(1734054920.931:808): avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:20.931000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e97660 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:20.942635 kernel: audit: type=1300 audit(1734054920.931:808): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e97660 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:20.942678 kernel: audit: type=1327 audit(1734054920.931:808): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:20.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:20.932000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:20.950117 kernel: audit: type=1400 audit(1734054920.932:809): avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:20.950160 kernel: audit: type=1300 audit(1734054920.932:809): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c82840 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:20.932000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c82840 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:20.932000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:20.958761 kernel: audit: type=1327 audit(1734054920.932:809): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:20.958793 kernel: audit: type=1400 audit(1734054920.932:810): avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:20.932000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:20.962277 kernel: audit: type=1300 audit(1734054920.932:810): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c82880 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:20.932000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c82880 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:20.966980 kernel: audit: type=1327 audit(1734054920.932:810): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:20.932000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:20.933000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:20.974448 kernel: audit: type=1400 audit(1734054920.933:811): avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:55:20.933000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e97840 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:55:20.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:55:22.346592 kubelet[1959]: E1213 01:55:22.346541 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:22.378544 sudo[1346]: pam_unix(sudo:session): session closed for user root Dec 13 01:55:22.377000 audit[1346]: USER_END pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:55:22.377000 audit[1346]: CRED_DISP pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:55:22.380143 sshd[1343]: pam_unix(sshd:session): session closed for user core Dec 13 01:55:22.380000 audit[1343]: USER_END pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:22.380000 audit[1343]: CRED_DISP pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:22.383157 systemd[1]: sshd@6-10.0.0.101:22-10.0.0.1:34236.service: Deactivated successfully. Dec 13 01:55:22.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.101:22-10.0.0.1:34236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:22.383820 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 01:55:22.383959 systemd[1]: session-7.scope: Consumed 3.873s CPU time. Dec 13 01:55:22.384347 systemd-logind[1195]: Session 7 logged out. Waiting for processes to exit. Dec 13 01:55:22.385037 systemd-logind[1195]: Removed session 7. Dec 13 01:55:22.971691 kubelet[1959]: E1213 01:55:22.971650 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:23.680017 kubelet[1959]: I1213 01:55:23.679981 1959 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 01:55:23.680397 env[1208]: time="2024-12-13T01:55:23.680269709Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 01:55:23.680560 kubelet[1959]: I1213 01:55:23.680407 1959 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 01:55:24.401543 systemd[1]: Created slice kubepods-besteffort-podce6c2886_61d2_4317_88d9_a351fba91620.slice. Dec 13 01:55:24.441318 kubelet[1959]: I1213 01:55:24.441265 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ce6c2886-61d2-4317-88d9-a351fba91620-kube-proxy\") pod \"kube-proxy-tvvnx\" (UID: \"ce6c2886-61d2-4317-88d9-a351fba91620\") " pod="kube-system/kube-proxy-tvvnx" Dec 13 01:55:24.441318 kubelet[1959]: I1213 01:55:24.441310 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ce6c2886-61d2-4317-88d9-a351fba91620-lib-modules\") pod \"kube-proxy-tvvnx\" (UID: \"ce6c2886-61d2-4317-88d9-a351fba91620\") " pod="kube-system/kube-proxy-tvvnx" Dec 13 01:55:24.441515 kubelet[1959]: I1213 01:55:24.441330 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ce6c2886-61d2-4317-88d9-a351fba91620-xtables-lock\") pod \"kube-proxy-tvvnx\" (UID: \"ce6c2886-61d2-4317-88d9-a351fba91620\") " pod="kube-system/kube-proxy-tvvnx" Dec 13 01:55:24.441515 kubelet[1959]: I1213 01:55:24.441390 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hv9sb\" (UniqueName: \"kubernetes.io/projected/ce6c2886-61d2-4317-88d9-a351fba91620-kube-api-access-hv9sb\") pod \"kube-proxy-tvvnx\" (UID: \"ce6c2886-61d2-4317-88d9-a351fba91620\") " pod="kube-system/kube-proxy-tvvnx" Dec 13 01:55:24.550126 kubelet[1959]: I1213 01:55:24.550089 1959 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 01:55:24.712175 kubelet[1959]: E1213 01:55:24.712043 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:24.712786 env[1208]: time="2024-12-13T01:55:24.712633398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tvvnx,Uid:ce6c2886-61d2-4317-88d9-a351fba91620,Namespace:kube-system,Attempt:0,}" Dec 13 01:55:24.840381 systemd[1]: Created slice kubepods-besteffort-podf264772d_980d_459d_beec_5feed96a2689.slice. Dec 13 01:55:24.843846 kubelet[1959]: I1213 01:55:24.843816 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f264772d-980d-459d-beec-5feed96a2689-var-lib-calico\") pod \"tigera-operator-76c4976dd7-bqgtw\" (UID: \"f264772d-980d-459d-beec-5feed96a2689\") " pod="tigera-operator/tigera-operator-76c4976dd7-bqgtw" Dec 13 01:55:24.843846 kubelet[1959]: I1213 01:55:24.843845 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wk9ks\" (UniqueName: \"kubernetes.io/projected/f264772d-980d-459d-beec-5feed96a2689-kube-api-access-wk9ks\") pod \"tigera-operator-76c4976dd7-bqgtw\" (UID: \"f264772d-980d-459d-beec-5feed96a2689\") " pod="tigera-operator/tigera-operator-76c4976dd7-bqgtw" Dec 13 01:55:24.901982 env[1208]: time="2024-12-13T01:55:24.901902429Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:24.901982 env[1208]: time="2024-12-13T01:55:24.901950640Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:24.901982 env[1208]: time="2024-12-13T01:55:24.901959958Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:24.902161 env[1208]: time="2024-12-13T01:55:24.902108238Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/50cfc1e25de02d7eca1c0e4e54fa0a8fe904117e74341e4cf08091c0520accb4 pid=2065 runtime=io.containerd.runc.v2 Dec 13 01:55:24.915237 systemd[1]: Started cri-containerd-50cfc1e25de02d7eca1c0e4e54fa0a8fe904117e74341e4cf08091c0520accb4.scope. Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit: BPF prog-id=103 op=LOAD Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2065 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:24.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636663316532356465303264376563613163306534653534666130 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2065 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:24.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636663316532356465303264376563613163306534653534666130 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.922000 audit: BPF prog-id=104 op=LOAD Dec 13 01:55:24.922000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a9630 items=0 ppid=2065 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:24.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636663316532356465303264376563613163306534653534666130 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit: BPF prog-id=105 op=LOAD Dec 13 01:55:24.923000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a9678 items=0 ppid=2065 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:24.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636663316532356465303264376563613163306534653534666130 Dec 13 01:55:24.923000 audit: BPF prog-id=105 op=UNLOAD Dec 13 01:55:24.923000 audit: BPF prog-id=104 op=UNLOAD Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.923000 audit: BPF prog-id=106 op=LOAD Dec 13 01:55:24.923000 audit[2076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a9a88 items=0 ppid=2065 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:24.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636663316532356465303264376563613163306534653534666130 Dec 13 01:55:24.933629 env[1208]: time="2024-12-13T01:55:24.933531356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tvvnx,Uid:ce6c2886-61d2-4317-88d9-a351fba91620,Namespace:kube-system,Attempt:0,} returns sandbox id \"50cfc1e25de02d7eca1c0e4e54fa0a8fe904117e74341e4cf08091c0520accb4\"" Dec 13 01:55:24.934456 kubelet[1959]: E1213 01:55:24.934430 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:24.936372 env[1208]: time="2024-12-13T01:55:24.936341443Z" level=info msg="CreateContainer within sandbox \"50cfc1e25de02d7eca1c0e4e54fa0a8fe904117e74341e4cf08091c0520accb4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 01:55:24.952778 env[1208]: time="2024-12-13T01:55:24.952717870Z" level=info msg="CreateContainer within sandbox \"50cfc1e25de02d7eca1c0e4e54fa0a8fe904117e74341e4cf08091c0520accb4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d37fe6316f7ebb6538c7d55df411f939343f72b345ba584ec90a645b87d5a85d\"" Dec 13 01:55:24.953561 env[1208]: time="2024-12-13T01:55:24.953519417Z" level=info msg="StartContainer for \"d37fe6316f7ebb6538c7d55df411f939343f72b345ba584ec90a645b87d5a85d\"" Dec 13 01:55:24.968009 systemd[1]: Started cri-containerd-d37fe6316f7ebb6538c7d55df411f939343f72b345ba584ec90a645b87d5a85d.scope. Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff7ec61ecc8 items=0 ppid=2065 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:24.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433376665363331366637656262363533386337643535646634313166 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit: BPF prog-id=107 op=LOAD Dec 13 01:55:24.980000 audit[2107]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003049d8 items=0 ppid=2065 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:24.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433376665363331366637656262363533386337643535646634313166 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit: BPF prog-id=108 op=LOAD Dec 13 01:55:24.980000 audit[2107]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000304a28 items=0 ppid=2065 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:24.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433376665363331366637656262363533386337643535646634313166 Dec 13 01:55:24.980000 audit: BPF prog-id=108 op=UNLOAD Dec 13 01:55:24.980000 audit: BPF prog-id=107 op=UNLOAD Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:24.980000 audit: BPF prog-id=109 op=LOAD Dec 13 01:55:24.980000 audit[2107]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000304ab8 items=0 ppid=2065 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:24.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433376665363331366637656262363533386337643535646634313166 Dec 13 01:55:25.001497 env[1208]: time="2024-12-13T01:55:25.001435773Z" level=info msg="StartContainer for \"d37fe6316f7ebb6538c7d55df411f939343f72b345ba584ec90a645b87d5a85d\" returns successfully" Dec 13 01:55:25.091000 audit[2167]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.091000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca047f460 a2=0 a3=7ffca047f44c items=0 ppid=2117 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:55:25.091000 audit[2168]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.091000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe621fa6d0 a2=0 a3=7ffe621fa6bc items=0 ppid=2117 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.091000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:55:25.093000 audit[2169]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.093000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf5f11c80 a2=0 a3=7ffcf5f11c6c items=0 ppid=2117 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:55:25.093000 audit[2170]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.093000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca3c68be0 a2=0 a3=7ffca3c68bcc items=0 ppid=2117 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:55:25.094000 audit[2171]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.094000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda083cb40 a2=0 a3=7ffda083cb2c items=0 ppid=2117 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:55:25.095000 audit[2172]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.095000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffff77ea20 a2=0 a3=7fffff77ea0c items=0 ppid=2117 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:55:25.124719 kubelet[1959]: E1213 01:55:25.124689 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:25.131828 kubelet[1959]: I1213 01:55:25.131777 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-tvvnx" podStartSLOduration=1.131759153 podStartE2EDuration="1.131759153s" podCreationTimestamp="2024-12-13 01:55:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:55:25.131405825 +0000 UTC m=+8.108107644" watchObservedRunningTime="2024-12-13 01:55:25.131759153 +0000 UTC m=+8.108460942" Dec 13 01:55:25.142991 env[1208]: time="2024-12-13T01:55:25.142952441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-bqgtw,Uid:f264772d-980d-459d-beec-5feed96a2689,Namespace:tigera-operator,Attempt:0,}" Dec 13 01:55:25.161197 env[1208]: time="2024-12-13T01:55:25.161122073Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:25.161197 env[1208]: time="2024-12-13T01:55:25.161163260Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:25.161197 env[1208]: time="2024-12-13T01:55:25.161176625Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:25.161559 env[1208]: time="2024-12-13T01:55:25.161494627Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cc7b78c2ac98f07eda61004ee2705c6ba897866102590d5b5a15053350e55279 pid=2180 runtime=io.containerd.runc.v2 Dec 13 01:55:25.170956 systemd[1]: Started cri-containerd-cc7b78c2ac98f07eda61004ee2705c6ba897866102590d5b5a15053350e55279.scope. Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit: BPF prog-id=110 op=LOAD Dec 13 01:55:25.179000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2180 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363376237386332616339386630376564613631303034656532373035 Dec 13 01:55:25.179000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.179000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2180 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363376237386332616339386630376564613631303034656532373035 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit: BPF prog-id=111 op=LOAD Dec 13 01:55:25.180000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025fce0 items=0 ppid=2180 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363376237386332616339386630376564613631303034656532373035 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit: BPF prog-id=112 op=LOAD Dec 13 01:55:25.180000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025fd28 items=0 ppid=2180 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363376237386332616339386630376564613631303034656532373035 Dec 13 01:55:25.180000 audit: BPF prog-id=112 op=UNLOAD Dec 13 01:55:25.180000 audit: BPF prog-id=111 op=UNLOAD Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:25.180000 audit: BPF prog-id=113 op=LOAD Dec 13 01:55:25.180000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e2138 items=0 ppid=2180 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363376237386332616339386630376564613631303034656532373035 Dec 13 01:55:25.193000 audit[2206]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.193000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc97367850 a2=0 a3=7ffc9736783c items=0 ppid=2117 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:55:25.196000 audit[2209]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.196000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd2c3ba5c0 a2=0 a3=7ffd2c3ba5ac items=0 ppid=2117 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 01:55:25.199000 audit[2218]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.199000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffdca1f110 a2=0 a3=7fffdca1f0fc items=0 ppid=2117 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 01:55:25.200000 audit[2219]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.200000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3869c070 a2=0 a3=7fff3869c05c items=0 ppid=2117 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:55:25.203941 env[1208]: time="2024-12-13T01:55:25.203893720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-bqgtw,Uid:f264772d-980d-459d-beec-5feed96a2689,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"cc7b78c2ac98f07eda61004ee2705c6ba897866102590d5b5a15053350e55279\"" Dec 13 01:55:25.203000 audit[2221]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.203000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf6e679d0 a2=0 a3=7ffdf6e679bc items=0 ppid=2117 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:55:25.205566 env[1208]: time="2024-12-13T01:55:25.205534262Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 01:55:25.205000 audit[2222]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.205000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc78effe80 a2=0 a3=7ffc78effe6c items=0 ppid=2117 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:55:25.207000 audit[2224]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.207000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd5aebc5a0 a2=0 a3=7ffd5aebc58c items=0 ppid=2117 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:55:25.210000 audit[2227]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.210000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeacfe1a30 a2=0 a3=7ffeacfe1a1c items=0 ppid=2117 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 01:55:25.211000 audit[2228]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.211000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9dab9fb0 a2=0 a3=7ffe9dab9f9c items=0 ppid=2117 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:55:25.213000 audit[2230]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.213000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9d15e5f0 a2=0 a3=7ffd9d15e5dc items=0 ppid=2117 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:55:25.214000 audit[2231]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.214000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea5d7aa90 a2=0 a3=7ffea5d7aa7c items=0 ppid=2117 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:55:25.216000 audit[2233]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.216000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5816b120 a2=0 a3=7ffe5816b10c items=0 ppid=2117 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:55:25.218000 audit[2236]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.218000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc615ae10 a2=0 a3=7fffc615adfc items=0 ppid=2117 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:55:25.222000 audit[2239]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.222000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff40bf7b30 a2=0 a3=7fff40bf7b1c items=0 ppid=2117 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:55:25.223000 audit[2240]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.223000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff88d2df20 a2=0 a3=7fff88d2df0c items=0 ppid=2117 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:55:25.225000 audit[2242]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.225000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdc8b11620 a2=0 a3=7ffdc8b1160c items=0 ppid=2117 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:55:25.228000 audit[2245]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.228000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff08d26cf0 a2=0 a3=7fff08d26cdc items=0 ppid=2117 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:55:25.228000 audit[2246]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.228000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee9eb54f0 a2=0 a3=7ffee9eb54dc items=0 ppid=2117 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:55:25.230000 audit[2248]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:25.230000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd61033bd0 a2=0 a3=7ffd61033bbc items=0 ppid=2117 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:55:25.248000 audit[2254]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:25.248000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe6185b100 a2=0 a3=7ffe6185b0ec items=0 ppid=2117 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:25.256000 audit[2254]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:25.256000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe6185b100 a2=0 a3=7ffe6185b0ec items=0 ppid=2117 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:25.257000 audit[2259]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.257000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc90b3120 a2=0 a3=7fffc90b310c items=0 ppid=2117 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:55:25.259000 audit[2261]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.259000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff15393190 a2=0 a3=7fff1539317c items=0 ppid=2117 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 01:55:25.262000 audit[2264]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.262000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff9d6a54e0 a2=0 a3=7fff9d6a54cc items=0 ppid=2117 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 01:55:25.263000 audit[2265]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.263000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe487a37c0 a2=0 a3=7ffe487a37ac items=0 ppid=2117 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:55:25.265000 audit[2267]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.265000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd53039650 a2=0 a3=7ffd5303963c items=0 ppid=2117 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:55:25.266000 audit[2268]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.266000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd696d4a70 a2=0 a3=7ffd696d4a5c items=0 ppid=2117 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:55:25.267000 audit[2270]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.267000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc0520ff50 a2=0 a3=7ffc0520ff3c items=0 ppid=2117 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 01:55:25.270000 audit[2273]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.270000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd1577f620 a2=0 a3=7ffd1577f60c items=0 ppid=2117 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:55:25.271000 audit[2274]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.271000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff39626540 a2=0 a3=7fff3962652c items=0 ppid=2117 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:55:25.273000 audit[2276]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.273000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdcdb32810 a2=0 a3=7ffdcdb327fc items=0 ppid=2117 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:55:25.273000 audit[2277]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.273000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc98edf5b0 a2=0 a3=7ffc98edf59c items=0 ppid=2117 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:55:25.275000 audit[2279]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.275000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff82b1c7b0 a2=0 a3=7fff82b1c79c items=0 ppid=2117 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:55:25.278000 audit[2282]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.278000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf9b2aed0 a2=0 a3=7ffcf9b2aebc items=0 ppid=2117 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:55:25.280000 audit[2285]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.280000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce8d269d0 a2=0 a3=7ffce8d269bc items=0 ppid=2117 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 01:55:25.281000 audit[2286]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.281000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcef2a6340 a2=0 a3=7ffcef2a632c items=0 ppid=2117 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:55:25.283000 audit[2288]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.283000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffe58d5660 a2=0 a3=7fffe58d564c items=0 ppid=2117 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:55:25.285000 audit[2291]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.285000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd9c808940 a2=0 a3=7ffd9c80892c items=0 ppid=2117 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:55:25.286000 audit[2292]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.286000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff94f7f0e0 a2=0 a3=7fff94f7f0cc items=0 ppid=2117 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:55:25.289000 audit[2294]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.289000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdc5320020 a2=0 a3=7ffdc532000c items=0 ppid=2117 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:55:25.290000 audit[2295]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.290000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd01c33090 a2=0 a3=7ffd01c3307c items=0 ppid=2117 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:55:25.292000 audit[2297]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.292000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc353a7da0 a2=0 a3=7ffc353a7d8c items=0 ppid=2117 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:55:25.294000 audit[2300]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:25.294000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec626e100 a2=0 a3=7ffec626e0ec items=0 ppid=2117 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:55:25.297000 audit[2302]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:55:25.297000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffde88dd5a0 a2=0 a3=7ffde88dd58c items=0 ppid=2117 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.297000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:25.297000 audit[2302]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:55:25.297000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffde88dd5a0 a2=0 a3=7ffde88dd58c items=0 ppid=2117 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:25.297000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:28.458534 kubelet[1959]: E1213 01:55:28.458504 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:29.132048 kubelet[1959]: E1213 01:55:29.132014 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:29.372426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3272525078.mount: Deactivated successfully. Dec 13 01:55:30.040613 env[1208]: time="2024-12-13T01:55:30.040570666Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:30.042362 env[1208]: time="2024-12-13T01:55:30.042338542Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:30.043855 env[1208]: time="2024-12-13T01:55:30.043825167Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:30.047013 env[1208]: time="2024-12-13T01:55:30.046984678Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:30.047724 env[1208]: time="2024-12-13T01:55:30.047687765Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 01:55:30.049674 env[1208]: time="2024-12-13T01:55:30.049651190Z" level=info msg="CreateContainer within sandbox \"cc7b78c2ac98f07eda61004ee2705c6ba897866102590d5b5a15053350e55279\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 01:55:30.061804 env[1208]: time="2024-12-13T01:55:30.061747634Z" level=info msg="CreateContainer within sandbox \"cc7b78c2ac98f07eda61004ee2705c6ba897866102590d5b5a15053350e55279\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"86c7a7da4ffacca9c3fe832c69de09919f917cf21e63ad9e0ac0966a19b89f37\"" Dec 13 01:55:30.062291 env[1208]: time="2024-12-13T01:55:30.062257256Z" level=info msg="StartContainer for \"86c7a7da4ffacca9c3fe832c69de09919f917cf21e63ad9e0ac0966a19b89f37\"" Dec 13 01:55:30.076360 systemd[1]: Started cri-containerd-86c7a7da4ffacca9c3fe832c69de09919f917cf21e63ad9e0ac0966a19b89f37.scope. Dec 13 01:55:30.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.091201 kernel: kauditd_printk_skb: 317 callbacks suppressed Dec 13 01:55:30.091259 kernel: audit: type=1400 audit(1734054930.087:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097988 kernel: audit: type=1400 audit(1734054930.087:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.098043 kernel: audit: type=1400 audit(1734054930.087:912): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.105748 kernel: audit: type=1400 audit(1734054930.087:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.106014 kernel: audit: type=1400 audit(1734054930.087:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.113827 kernel: audit: type=1400 audit(1734054930.087:915): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.113967 kernel: audit: type=1400 audit(1734054930.087:916): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.121600 kernel: audit: type=1400 audit(1734054930.087:917): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.125326 kernel: audit: type=1400 audit(1734054930.087:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.129285 kernel: audit: type=1400 audit(1734054930.089:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit: BPF prog-id=114 op=LOAD Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2180 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:30.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633761376461346666616363613963336665383332633639646530 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2180 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:30.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633761376461346666616363613963336665383332633639646530 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.089000 audit: BPF prog-id=115 op=LOAD Dec 13 01:55:30.089000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000394a60 items=0 ppid=2180 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:30.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633761376461346666616363613963336665383332633639646530 Dec 13 01:55:30.093000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.093000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.093000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.093000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.093000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.093000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.093000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.093000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.093000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.093000 audit: BPF prog-id=116 op=LOAD Dec 13 01:55:30.093000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000394aa8 items=0 ppid=2180 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:30.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633761376461346666616363613963336665383332633639646530 Dec 13 01:55:30.097000 audit: BPF prog-id=116 op=UNLOAD Dec 13 01:55:30.097000 audit: BPF prog-id=115 op=UNLOAD Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:30.097000 audit: BPF prog-id=117 op=LOAD Dec 13 01:55:30.097000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000394eb8 items=0 ppid=2180 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:30.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633761376461346666616363613963336665383332633639646530 Dec 13 01:55:30.130964 env[1208]: time="2024-12-13T01:55:30.129534611Z" level=info msg="StartContainer for \"86c7a7da4ffacca9c3fe832c69de09919f917cf21e63ad9e0ac0966a19b89f37\" returns successfully" Dec 13 01:55:32.351125 kubelet[1959]: E1213 01:55:32.351090 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:32.358669 kubelet[1959]: I1213 01:55:32.358600 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-bqgtw" podStartSLOduration=3.5150071819999997 podStartE2EDuration="8.358582398s" podCreationTimestamp="2024-12-13 01:55:24 +0000 UTC" firstStartedPulling="2024-12-13 01:55:25.204970336 +0000 UTC m=+8.181672136" lastFinishedPulling="2024-12-13 01:55:30.048545553 +0000 UTC m=+13.025247352" observedRunningTime="2024-12-13 01:55:30.150465975 +0000 UTC m=+13.127167775" watchObservedRunningTime="2024-12-13 01:55:32.358582398 +0000 UTC m=+15.335284197" Dec 13 01:55:32.801000 audit[2342]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:32.801000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffa8c136a0 a2=0 a3=7fffa8c1368c items=0 ppid=2117 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:32.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:32.807000 audit[2342]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:32.807000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa8c136a0 a2=0 a3=0 items=0 ppid=2117 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:32.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:32.816000 audit[2344]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:32.816000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe87e942f0 a2=0 a3=7ffe87e942dc items=0 ppid=2117 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:32.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:32.823000 audit[2344]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:32.823000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe87e942f0 a2=0 a3=0 items=0 ppid=2117 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:32.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:32.975612 kubelet[1959]: E1213 01:55:32.975576 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:33.161708 systemd[1]: Created slice kubepods-besteffort-podcc6ee203_5577_4d1e_a50a_7229089cff00.slice. Dec 13 01:55:33.194339 kubelet[1959]: I1213 01:55:33.194253 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/cc6ee203-5577-4d1e-a50a-7229089cff00-typha-certs\") pod \"calico-typha-84dcbf7b88-x7c4n\" (UID: \"cc6ee203-5577-4d1e-a50a-7229089cff00\") " pod="calico-system/calico-typha-84dcbf7b88-x7c4n" Dec 13 01:55:33.194339 kubelet[1959]: I1213 01:55:33.194325 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cc6ee203-5577-4d1e-a50a-7229089cff00-tigera-ca-bundle\") pod \"calico-typha-84dcbf7b88-x7c4n\" (UID: \"cc6ee203-5577-4d1e-a50a-7229089cff00\") " pod="calico-system/calico-typha-84dcbf7b88-x7c4n" Dec 13 01:55:33.194569 kubelet[1959]: I1213 01:55:33.194354 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4kb8n\" (UniqueName: \"kubernetes.io/projected/cc6ee203-5577-4d1e-a50a-7229089cff00-kube-api-access-4kb8n\") pod \"calico-typha-84dcbf7b88-x7c4n\" (UID: \"cc6ee203-5577-4d1e-a50a-7229089cff00\") " pod="calico-system/calico-typha-84dcbf7b88-x7c4n" Dec 13 01:55:33.207902 systemd[1]: Created slice kubepods-besteffort-podd983a7c6_454d_4322_adf3_ec94874a26f1.slice. Dec 13 01:55:33.295300 kubelet[1959]: I1213 01:55:33.295263 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d983a7c6-454d-4322-adf3-ec94874a26f1-lib-modules\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295300 kubelet[1959]: I1213 01:55:33.295294 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d983a7c6-454d-4322-adf3-ec94874a26f1-var-lib-calico\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295300 kubelet[1959]: I1213 01:55:33.295308 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d983a7c6-454d-4322-adf3-ec94874a26f1-xtables-lock\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295522 kubelet[1959]: I1213 01:55:33.295326 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d983a7c6-454d-4322-adf3-ec94874a26f1-tigera-ca-bundle\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295522 kubelet[1959]: I1213 01:55:33.295340 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d983a7c6-454d-4322-adf3-ec94874a26f1-cni-log-dir\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295522 kubelet[1959]: I1213 01:55:33.295354 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d983a7c6-454d-4322-adf3-ec94874a26f1-flexvol-driver-host\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295522 kubelet[1959]: I1213 01:55:33.295372 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d983a7c6-454d-4322-adf3-ec94874a26f1-node-certs\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295522 kubelet[1959]: I1213 01:55:33.295386 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d983a7c6-454d-4322-adf3-ec94874a26f1-cni-bin-dir\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295635 kubelet[1959]: I1213 01:55:33.295412 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d983a7c6-454d-4322-adf3-ec94874a26f1-policysync\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295635 kubelet[1959]: I1213 01:55:33.295430 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d983a7c6-454d-4322-adf3-ec94874a26f1-var-run-calico\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295635 kubelet[1959]: I1213 01:55:33.295443 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d983a7c6-454d-4322-adf3-ec94874a26f1-cni-net-dir\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.295635 kubelet[1959]: I1213 01:55:33.295455 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dkczd\" (UniqueName: \"kubernetes.io/projected/d983a7c6-454d-4322-adf3-ec94874a26f1-kube-api-access-dkczd\") pod \"calico-node-6vpnr\" (UID: \"d983a7c6-454d-4322-adf3-ec94874a26f1\") " pod="calico-system/calico-node-6vpnr" Dec 13 01:55:33.317426 kubelet[1959]: E1213 01:55:33.317370 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:33.395828 kubelet[1959]: I1213 01:55:33.395761 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mp5zj\" (UniqueName: \"kubernetes.io/projected/cf8f8d94-2bf0-4200-944d-c1dc194dbbca-kube-api-access-mp5zj\") pod \"csi-node-driver-h6vvx\" (UID: \"cf8f8d94-2bf0-4200-944d-c1dc194dbbca\") " pod="calico-system/csi-node-driver-h6vvx" Dec 13 01:55:33.395828 kubelet[1959]: I1213 01:55:33.395815 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cf8f8d94-2bf0-4200-944d-c1dc194dbbca-kubelet-dir\") pod \"csi-node-driver-h6vvx\" (UID: \"cf8f8d94-2bf0-4200-944d-c1dc194dbbca\") " pod="calico-system/csi-node-driver-h6vvx" Dec 13 01:55:33.396215 kubelet[1959]: I1213 01:55:33.395852 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cf8f8d94-2bf0-4200-944d-c1dc194dbbca-registration-dir\") pod \"csi-node-driver-h6vvx\" (UID: \"cf8f8d94-2bf0-4200-944d-c1dc194dbbca\") " pod="calico-system/csi-node-driver-h6vvx" Dec 13 01:55:33.396215 kubelet[1959]: I1213 01:55:33.395881 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cf8f8d94-2bf0-4200-944d-c1dc194dbbca-socket-dir\") pod \"csi-node-driver-h6vvx\" (UID: \"cf8f8d94-2bf0-4200-944d-c1dc194dbbca\") " pod="calico-system/csi-node-driver-h6vvx" Dec 13 01:55:33.396215 kubelet[1959]: I1213 01:55:33.395901 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cf8f8d94-2bf0-4200-944d-c1dc194dbbca-varrun\") pod \"csi-node-driver-h6vvx\" (UID: \"cf8f8d94-2bf0-4200-944d-c1dc194dbbca\") " pod="calico-system/csi-node-driver-h6vvx" Dec 13 01:55:33.396917 kubelet[1959]: E1213 01:55:33.396898 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.396917 kubelet[1959]: W1213 01:55:33.396914 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.397060 kubelet[1959]: E1213 01:55:33.396928 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.399201 kubelet[1959]: E1213 01:55:33.399157 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.399201 kubelet[1959]: W1213 01:55:33.399175 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.399201 kubelet[1959]: E1213 01:55:33.399200 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.410949 kubelet[1959]: E1213 01:55:33.410920 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.410949 kubelet[1959]: W1213 01:55:33.410939 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.411071 kubelet[1959]: E1213 01:55:33.410962 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.465356 kubelet[1959]: E1213 01:55:33.465221 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:33.466498 env[1208]: time="2024-12-13T01:55:33.465748746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84dcbf7b88-x7c4n,Uid:cc6ee203-5577-4d1e-a50a-7229089cff00,Namespace:calico-system,Attempt:0,}" Dec 13 01:55:33.480572 env[1208]: time="2024-12-13T01:55:33.480517254Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:33.480572 env[1208]: time="2024-12-13T01:55:33.480574652Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:33.480715 env[1208]: time="2024-12-13T01:55:33.480596343Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:33.480819 env[1208]: time="2024-12-13T01:55:33.480753849Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cc0cd3cc57a588f2b396a6ee5d2da2b16ad2bb428044ae4d2255e4d31d31ca7e pid=2358 runtime=io.containerd.runc.v2 Dec 13 01:55:33.490731 systemd[1]: Started cri-containerd-cc0cd3cc57a588f2b396a6ee5d2da2b16ad2bb428044ae4d2255e4d31d31ca7e.scope. Dec 13 01:55:33.496628 kubelet[1959]: E1213 01:55:33.496592 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.496628 kubelet[1959]: W1213 01:55:33.496617 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.503760 kubelet[1959]: E1213 01:55:33.496646 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.503760 kubelet[1959]: E1213 01:55:33.496888 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.503760 kubelet[1959]: W1213 01:55:33.496896 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.503760 kubelet[1959]: E1213 01:55:33.496907 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.503760 kubelet[1959]: E1213 01:55:33.497134 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.503760 kubelet[1959]: W1213 01:55:33.497152 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.503760 kubelet[1959]: E1213 01:55:33.497163 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.503760 kubelet[1959]: E1213 01:55:33.497685 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.503760 kubelet[1959]: W1213 01:55:33.497694 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.503760 kubelet[1959]: E1213 01:55:33.497707 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.505085 kubelet[1959]: E1213 01:55:33.500261 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.505085 kubelet[1959]: W1213 01:55:33.500269 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.505085 kubelet[1959]: E1213 01:55:33.500280 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.505085 kubelet[1959]: E1213 01:55:33.501335 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.505085 kubelet[1959]: W1213 01:55:33.501356 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.505085 kubelet[1959]: E1213 01:55:33.501414 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.505085 kubelet[1959]: E1213 01:55:33.501569 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.505085 kubelet[1959]: W1213 01:55:33.501578 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.505085 kubelet[1959]: E1213 01:55:33.501624 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.505085 kubelet[1959]: E1213 01:55:33.501796 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.505656 kubelet[1959]: W1213 01:55:33.501806 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.505656 kubelet[1959]: E1213 01:55:33.501854 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.505656 kubelet[1959]: E1213 01:55:33.502019 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.505656 kubelet[1959]: W1213 01:55:33.502027 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.505656 kubelet[1959]: E1213 01:55:33.502060 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.505656 kubelet[1959]: E1213 01:55:33.502215 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.505656 kubelet[1959]: W1213 01:55:33.502223 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.505656 kubelet[1959]: E1213 01:55:33.502261 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.505656 kubelet[1959]: E1213 01:55:33.502413 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.505656 kubelet[1959]: W1213 01:55:33.502422 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.506075 kubelet[1959]: E1213 01:55:33.502442 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.506075 kubelet[1959]: E1213 01:55:33.502614 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.506075 kubelet[1959]: W1213 01:55:33.502622 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.506075 kubelet[1959]: E1213 01:55:33.502641 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.506075 kubelet[1959]: E1213 01:55:33.502882 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.506075 kubelet[1959]: W1213 01:55:33.502890 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.506075 kubelet[1959]: E1213 01:55:33.502929 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.506075 kubelet[1959]: E1213 01:55:33.503088 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.506075 kubelet[1959]: W1213 01:55:33.503095 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.506075 kubelet[1959]: E1213 01:55:33.503870 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.506533 kubelet[1959]: E1213 01:55:33.503933 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.506533 kubelet[1959]: W1213 01:55:33.503940 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.506533 kubelet[1959]: E1213 01:55:33.503987 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.506533 kubelet[1959]: E1213 01:55:33.504114 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.506533 kubelet[1959]: W1213 01:55:33.504124 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.506533 kubelet[1959]: E1213 01:55:33.504152 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.506533 kubelet[1959]: E1213 01:55:33.504611 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.506533 kubelet[1959]: W1213 01:55:33.504620 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.506533 kubelet[1959]: E1213 01:55:33.504690 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.506533 kubelet[1959]: E1213 01:55:33.504911 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.506000 audit: BPF prog-id=118 op=LOAD Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363306364336363353761353838663262333936613665653564326461 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363306364336363353761353838663262333936613665653564326461 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit: BPF prog-id=119 op=LOAD Dec 13 01:55:33.507000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9a20 items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363306364336363353761353838663262333936613665653564326461 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit: BPF prog-id=120 op=LOAD Dec 13 01:55:33.507000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9a68 items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363306364336363353761353838663262333936613665653564326461 Dec 13 01:55:33.507000 audit: BPF prog-id=120 op=UNLOAD Dec 13 01:55:33.507000 audit: BPF prog-id=119 op=UNLOAD Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.507000 audit: BPF prog-id=121 op=LOAD Dec 13 01:55:33.507000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d9e78 items=0 ppid=2358 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363306364336363353761353838663262333936613665653564326461 Dec 13 01:55:33.510972 kubelet[1959]: W1213 01:55:33.504920 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.510972 kubelet[1959]: E1213 01:55:33.504941 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.510972 kubelet[1959]: E1213 01:55:33.509358 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.510972 kubelet[1959]: W1213 01:55:33.509371 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.510972 kubelet[1959]: E1213 01:55:33.509417 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.510972 kubelet[1959]: E1213 01:55:33.509668 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.510972 kubelet[1959]: W1213 01:55:33.509676 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.510972 kubelet[1959]: E1213 01:55:33.509720 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.510972 kubelet[1959]: E1213 01:55:33.509848 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:33.511172 env[1208]: time="2024-12-13T01:55:33.510306765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6vpnr,Uid:d983a7c6-454d-4322-adf3-ec94874a26f1,Namespace:calico-system,Attempt:0,}" Dec 13 01:55:33.512026 kubelet[1959]: E1213 01:55:33.511823 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.512026 kubelet[1959]: W1213 01:55:33.511833 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.512026 kubelet[1959]: E1213 01:55:33.511886 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.512171 kubelet[1959]: E1213 01:55:33.512143 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.512171 kubelet[1959]: W1213 01:55:33.512157 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.512308 kubelet[1959]: E1213 01:55:33.512284 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.512479 kubelet[1959]: E1213 01:55:33.512463 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.512479 kubelet[1959]: W1213 01:55:33.512476 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.512605 kubelet[1959]: E1213 01:55:33.512583 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.512755 kubelet[1959]: E1213 01:55:33.512739 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.512755 kubelet[1959]: W1213 01:55:33.512751 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.512860 kubelet[1959]: E1213 01:55:33.512773 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.513155 kubelet[1959]: E1213 01:55:33.513131 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.513155 kubelet[1959]: W1213 01:55:33.513153 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.513294 kubelet[1959]: E1213 01:55:33.513179 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.520423 kubelet[1959]: E1213 01:55:33.520392 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:33.520423 kubelet[1959]: W1213 01:55:33.520411 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:33.520565 kubelet[1959]: E1213 01:55:33.520433 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:33.533437 env[1208]: time="2024-12-13T01:55:33.533394924Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84dcbf7b88-x7c4n,Uid:cc6ee203-5577-4d1e-a50a-7229089cff00,Namespace:calico-system,Attempt:0,} returns sandbox id \"cc0cd3cc57a588f2b396a6ee5d2da2b16ad2bb428044ae4d2255e4d31d31ca7e\"" Dec 13 01:55:33.534151 kubelet[1959]: E1213 01:55:33.534122 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:33.535074 env[1208]: time="2024-12-13T01:55:33.535051316Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 01:55:33.559984 env[1208]: time="2024-12-13T01:55:33.559910994Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:33.559984 env[1208]: time="2024-12-13T01:55:33.559949768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:33.560228 env[1208]: time="2024-12-13T01:55:33.559962742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:33.560228 env[1208]: time="2024-12-13T01:55:33.560101413Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23f7b82b522f0fcbcf7856f2914dcef6cfb9d393d57207c56cf01e7cb2f172b7 pid=2427 runtime=io.containerd.runc.v2 Dec 13 01:55:33.570049 systemd[1]: Started cri-containerd-23f7b82b522f0fcbcf7856f2914dcef6cfb9d393d57207c56cf01e7cb2f172b7.scope. Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.578000 audit: BPF prog-id=122 op=LOAD Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2427 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663762383262353232663066636263663738353666323931346463 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2427 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663762383262353232663066636263663738353666323931346463 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit: BPF prog-id=123 op=LOAD Dec 13 01:55:33.579000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032bd10 items=0 ppid=2427 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663762383262353232663066636263663738353666323931346463 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit: BPF prog-id=124 op=LOAD Dec 13 01:55:33.579000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032bd58 items=0 ppid=2427 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663762383262353232663066636263663738353666323931346463 Dec 13 01:55:33.579000 audit: BPF prog-id=124 op=UNLOAD Dec 13 01:55:33.579000 audit: BPF prog-id=123 op=UNLOAD Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:33.579000 audit: BPF prog-id=125 op=LOAD Dec 13 01:55:33.579000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00037e168 items=0 ppid=2427 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663762383262353232663066636263663738353666323931346463 Dec 13 01:55:33.590986 env[1208]: time="2024-12-13T01:55:33.590943719Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6vpnr,Uid:d983a7c6-454d-4322-adf3-ec94874a26f1,Namespace:calico-system,Attempt:0,} returns sandbox id \"23f7b82b522f0fcbcf7856f2914dcef6cfb9d393d57207c56cf01e7cb2f172b7\"" Dec 13 01:55:33.591635 kubelet[1959]: E1213 01:55:33.591602 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:33.833000 audit[2461]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:33.833000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffede774840 a2=0 a3=7ffede77482c items=0 ppid=2117 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:33.839000 audit[2461]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:33.839000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffede774840 a2=0 a3=0 items=0 ppid=2117 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:33.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:35.106459 kubelet[1959]: E1213 01:55:35.106288 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:35.275863 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2661004548.mount: Deactivated successfully. Dec 13 01:55:36.140004 env[1208]: time="2024-12-13T01:55:36.139953089Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:36.141890 env[1208]: time="2024-12-13T01:55:36.141839411Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:36.143578 env[1208]: time="2024-12-13T01:55:36.143520948Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:36.145389 env[1208]: time="2024-12-13T01:55:36.145325166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:36.145644 env[1208]: time="2024-12-13T01:55:36.145608379Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 01:55:36.147102 env[1208]: time="2024-12-13T01:55:36.146818067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 01:55:36.153417 env[1208]: time="2024-12-13T01:55:36.152126985Z" level=info msg="CreateContainer within sandbox \"cc0cd3cc57a588f2b396a6ee5d2da2b16ad2bb428044ae4d2255e4d31d31ca7e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 01:55:36.164584 env[1208]: time="2024-12-13T01:55:36.164533431Z" level=info msg="CreateContainer within sandbox \"cc0cd3cc57a588f2b396a6ee5d2da2b16ad2bb428044ae4d2255e4d31d31ca7e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"aa19a221a2400822c6ed77243de2e7f0539e225500d4670753044740ba6a1cd1\"" Dec 13 01:55:36.165217 env[1208]: time="2024-12-13T01:55:36.165162485Z" level=info msg="StartContainer for \"aa19a221a2400822c6ed77243de2e7f0539e225500d4670753044740ba6a1cd1\"" Dec 13 01:55:36.179722 systemd[1]: Started cri-containerd-aa19a221a2400822c6ed77243de2e7f0539e225500d4670753044740ba6a1cd1.scope. Dec 13 01:55:36.193559 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 01:55:36.193717 kernel: audit: type=1400 audit(1734054936.188:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.193756 kernel: audit: type=1400 audit(1734054936.188:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.203441 kernel: audit: type=1400 audit(1734054936.188:972): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.203547 kernel: audit: type=1400 audit(1734054936.188:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.203576 kernel: audit: type=1400 audit(1734054936.188:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.205242 kernel: audit: type=1400 audit(1734054936.188:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.211043 kernel: audit: type=1400 audit(1734054936.188:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.214039 kernel: audit: type=1400 audit(1734054936.188:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.216946 kernel: audit: type=1400 audit(1734054936.188:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.219888 kernel: audit: type=1400 audit(1734054936.192:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit: BPF prog-id=126 op=LOAD Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2358 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:36.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161313961323231613234303038323263366564373732343364653265 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2358 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:36.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161313961323231613234303038323263366564373732343364653265 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.192000 audit: BPF prog-id=127 op=LOAD Dec 13 01:55:36.192000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00029a900 items=0 ppid=2358 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:36.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161313961323231613234303038323263366564373732343364653265 Dec 13 01:55:36.198000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.198000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.198000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.198000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.198000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.198000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.198000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.198000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.198000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.198000 audit: BPF prog-id=128 op=LOAD Dec 13 01:55:36.198000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00029a948 items=0 ppid=2358 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:36.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161313961323231613234303038323263366564373732343364653265 Dec 13 01:55:36.203000 audit: BPF prog-id=128 op=UNLOAD Dec 13 01:55:36.204000 audit: BPF prog-id=127 op=UNLOAD Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:36.204000 audit: BPF prog-id=129 op=LOAD Dec 13 01:55:36.204000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00029ad58 items=0 ppid=2358 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:36.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161313961323231613234303038323263366564373732343364653265 Dec 13 01:55:36.240034 env[1208]: time="2024-12-13T01:55:36.239953660Z" level=info msg="StartContainer for \"aa19a221a2400822c6ed77243de2e7f0539e225500d4670753044740ba6a1cd1\" returns successfully" Dec 13 01:55:37.106988 kubelet[1959]: E1213 01:55:37.106939 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:37.152384 kubelet[1959]: E1213 01:55:37.150571 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:37.160433 kubelet[1959]: I1213 01:55:37.160250 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-84dcbf7b88-x7c4n" podStartSLOduration=2.548559161 podStartE2EDuration="5.160230914s" podCreationTimestamp="2024-12-13 01:55:32 +0000 UTC" firstStartedPulling="2024-12-13 01:55:33.534818968 +0000 UTC m=+16.511520757" lastFinishedPulling="2024-12-13 01:55:36.146490711 +0000 UTC m=+19.123192510" observedRunningTime="2024-12-13 01:55:37.159696107 +0000 UTC m=+20.136397906" watchObservedRunningTime="2024-12-13 01:55:37.160230914 +0000 UTC m=+20.136932713" Dec 13 01:55:37.217996 kubelet[1959]: E1213 01:55:37.217956 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.217996 kubelet[1959]: W1213 01:55:37.217979 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.217996 kubelet[1959]: E1213 01:55:37.217998 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.218234 kubelet[1959]: E1213 01:55:37.218159 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.218234 kubelet[1959]: W1213 01:55:37.218165 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.218234 kubelet[1959]: E1213 01:55:37.218172 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.218333 kubelet[1959]: E1213 01:55:37.218315 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.218333 kubelet[1959]: W1213 01:55:37.218322 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.218333 kubelet[1959]: E1213 01:55:37.218328 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.218569 kubelet[1959]: E1213 01:55:37.218551 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.218569 kubelet[1959]: W1213 01:55:37.218565 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.218643 kubelet[1959]: E1213 01:55:37.218576 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.218819 kubelet[1959]: E1213 01:55:37.218784 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.218819 kubelet[1959]: W1213 01:55:37.218797 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.218819 kubelet[1959]: E1213 01:55:37.218805 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.219056 kubelet[1959]: E1213 01:55:37.218976 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.219056 kubelet[1959]: W1213 01:55:37.218983 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.219056 kubelet[1959]: E1213 01:55:37.218989 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.219227 kubelet[1959]: E1213 01:55:37.219178 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.219227 kubelet[1959]: W1213 01:55:37.219215 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.219426 kubelet[1959]: E1213 01:55:37.219241 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.219478 kubelet[1959]: E1213 01:55:37.219463 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.219478 kubelet[1959]: W1213 01:55:37.219475 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.219538 kubelet[1959]: E1213 01:55:37.219484 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.219679 kubelet[1959]: E1213 01:55:37.219653 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.219734 kubelet[1959]: W1213 01:55:37.219681 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.219734 kubelet[1959]: E1213 01:55:37.219691 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.219879 kubelet[1959]: E1213 01:55:37.219858 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.219879 kubelet[1959]: W1213 01:55:37.219874 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.220023 kubelet[1959]: E1213 01:55:37.219887 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.220067 kubelet[1959]: E1213 01:55:37.220026 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.220067 kubelet[1959]: W1213 01:55:37.220033 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.220067 kubelet[1959]: E1213 01:55:37.220040 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.220214 kubelet[1959]: E1213 01:55:37.220198 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.220214 kubelet[1959]: W1213 01:55:37.220210 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.220265 kubelet[1959]: E1213 01:55:37.220219 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.220406 kubelet[1959]: E1213 01:55:37.220388 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.220406 kubelet[1959]: W1213 01:55:37.220398 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.220406 kubelet[1959]: E1213 01:55:37.220404 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.220570 kubelet[1959]: E1213 01:55:37.220535 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.220570 kubelet[1959]: W1213 01:55:37.220544 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.220620 kubelet[1959]: E1213 01:55:37.220566 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.220744 kubelet[1959]: E1213 01:55:37.220729 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.220744 kubelet[1959]: W1213 01:55:37.220738 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.220744 kubelet[1959]: E1213 01:55:37.220745 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.229134 kubelet[1959]: E1213 01:55:37.229101 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.229134 kubelet[1959]: W1213 01:55:37.229124 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.229222 kubelet[1959]: E1213 01:55:37.229144 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.229368 kubelet[1959]: E1213 01:55:37.229346 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.229368 kubelet[1959]: W1213 01:55:37.229358 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.229444 kubelet[1959]: E1213 01:55:37.229372 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.229562 kubelet[1959]: E1213 01:55:37.229542 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.229562 kubelet[1959]: W1213 01:55:37.229554 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.229646 kubelet[1959]: E1213 01:55:37.229567 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.229803 kubelet[1959]: E1213 01:55:37.229787 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.229803 kubelet[1959]: W1213 01:55:37.229797 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.229890 kubelet[1959]: E1213 01:55:37.229809 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.229978 kubelet[1959]: E1213 01:55:37.229965 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.229978 kubelet[1959]: W1213 01:55:37.229975 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.230025 kubelet[1959]: E1213 01:55:37.229986 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.230132 kubelet[1959]: E1213 01:55:37.230120 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.230132 kubelet[1959]: W1213 01:55:37.230130 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.230180 kubelet[1959]: E1213 01:55:37.230141 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.230325 kubelet[1959]: E1213 01:55:37.230304 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.230325 kubelet[1959]: W1213 01:55:37.230315 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.230375 kubelet[1959]: E1213 01:55:37.230328 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.230587 kubelet[1959]: E1213 01:55:37.230562 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.230587 kubelet[1959]: W1213 01:55:37.230579 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.230633 kubelet[1959]: E1213 01:55:37.230594 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.230789 kubelet[1959]: E1213 01:55:37.230760 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.230789 kubelet[1959]: W1213 01:55:37.230769 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.230854 kubelet[1959]: E1213 01:55:37.230820 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.230965 kubelet[1959]: E1213 01:55:37.230950 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.230965 kubelet[1959]: W1213 01:55:37.230962 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.231015 kubelet[1959]: E1213 01:55:37.230987 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.231125 kubelet[1959]: E1213 01:55:37.231113 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.231125 kubelet[1959]: W1213 01:55:37.231123 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.231173 kubelet[1959]: E1213 01:55:37.231135 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.231312 kubelet[1959]: E1213 01:55:37.231300 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.231312 kubelet[1959]: W1213 01:55:37.231309 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.231358 kubelet[1959]: E1213 01:55:37.231321 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.231484 kubelet[1959]: E1213 01:55:37.231475 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.231509 kubelet[1959]: W1213 01:55:37.231484 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.231509 kubelet[1959]: E1213 01:55:37.231498 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.231632 kubelet[1959]: E1213 01:55:37.231623 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.231632 kubelet[1959]: W1213 01:55:37.231630 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.231697 kubelet[1959]: E1213 01:55:37.231641 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.231831 kubelet[1959]: E1213 01:55:37.231814 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.231831 kubelet[1959]: W1213 01:55:37.231826 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.231876 kubelet[1959]: E1213 01:55:37.231840 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.232055 kubelet[1959]: E1213 01:55:37.232043 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.232055 kubelet[1959]: W1213 01:55:37.232052 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.232118 kubelet[1959]: E1213 01:55:37.232064 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.232516 kubelet[1959]: E1213 01:55:37.232491 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.232516 kubelet[1959]: W1213 01:55:37.232511 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.232590 kubelet[1959]: E1213 01:55:37.232522 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:37.232678 kubelet[1959]: E1213 01:55:37.232658 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:37.232678 kubelet[1959]: W1213 01:55:37.232671 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:37.232678 kubelet[1959]: E1213 01:55:37.232678 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.151556 kubelet[1959]: I1213 01:55:38.151530 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:55:38.152332 kubelet[1959]: E1213 01:55:38.152287 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:38.225714 kubelet[1959]: E1213 01:55:38.225655 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.225714 kubelet[1959]: W1213 01:55:38.225704 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.225897 kubelet[1959]: E1213 01:55:38.225727 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.225976 kubelet[1959]: E1213 01:55:38.225952 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.225976 kubelet[1959]: W1213 01:55:38.225971 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.226055 kubelet[1959]: E1213 01:55:38.225982 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.226140 kubelet[1959]: E1213 01:55:38.226118 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.226140 kubelet[1959]: W1213 01:55:38.226133 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.226225 kubelet[1959]: E1213 01:55:38.226143 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.226295 kubelet[1959]: E1213 01:55:38.226276 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.226295 kubelet[1959]: W1213 01:55:38.226289 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.226295 kubelet[1959]: E1213 01:55:38.226296 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.226423 kubelet[1959]: E1213 01:55:38.226403 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.226423 kubelet[1959]: W1213 01:55:38.226416 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.226423 kubelet[1959]: E1213 01:55:38.226422 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.226538 kubelet[1959]: E1213 01:55:38.226518 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.226538 kubelet[1959]: W1213 01:55:38.226531 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.226538 kubelet[1959]: E1213 01:55:38.226537 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.228638 kubelet[1959]: E1213 01:55:38.226645 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.228638 kubelet[1959]: W1213 01:55:38.226661 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.228638 kubelet[1959]: E1213 01:55:38.226676 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.228638 kubelet[1959]: E1213 01:55:38.226832 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.228638 kubelet[1959]: W1213 01:55:38.226840 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.228638 kubelet[1959]: E1213 01:55:38.226849 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.228638 kubelet[1959]: E1213 01:55:38.226983 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.228638 kubelet[1959]: W1213 01:55:38.226991 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.228638 kubelet[1959]: E1213 01:55:38.227000 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.228638 kubelet[1959]: E1213 01:55:38.227122 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.228917 kubelet[1959]: W1213 01:55:38.227129 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.228917 kubelet[1959]: E1213 01:55:38.227138 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.228917 kubelet[1959]: E1213 01:55:38.227351 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.228917 kubelet[1959]: W1213 01:55:38.227359 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.228917 kubelet[1959]: E1213 01:55:38.227369 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.228917 kubelet[1959]: E1213 01:55:38.227547 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.228917 kubelet[1959]: W1213 01:55:38.227559 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.228917 kubelet[1959]: E1213 01:55:38.227569 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.228917 kubelet[1959]: E1213 01:55:38.227721 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.228917 kubelet[1959]: W1213 01:55:38.227730 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.229234 kubelet[1959]: E1213 01:55:38.227738 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.229234 kubelet[1959]: E1213 01:55:38.227865 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.229234 kubelet[1959]: W1213 01:55:38.227873 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.229234 kubelet[1959]: E1213 01:55:38.227881 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.229234 kubelet[1959]: E1213 01:55:38.228008 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.229234 kubelet[1959]: W1213 01:55:38.228015 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.229234 kubelet[1959]: E1213 01:55:38.228024 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.236636 kubelet[1959]: E1213 01:55:38.236595 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.236636 kubelet[1959]: W1213 01:55:38.236626 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.236756 kubelet[1959]: E1213 01:55:38.236650 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.236992 kubelet[1959]: E1213 01:55:38.236957 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.236992 kubelet[1959]: W1213 01:55:38.236983 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.237068 kubelet[1959]: E1213 01:55:38.237010 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.237257 kubelet[1959]: E1213 01:55:38.237244 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.237257 kubelet[1959]: W1213 01:55:38.237252 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.237346 kubelet[1959]: E1213 01:55:38.237265 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.237446 kubelet[1959]: E1213 01:55:38.237427 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.237446 kubelet[1959]: W1213 01:55:38.237440 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.237541 kubelet[1959]: E1213 01:55:38.237454 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.237617 kubelet[1959]: E1213 01:55:38.237602 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.237617 kubelet[1959]: W1213 01:55:38.237611 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.237717 kubelet[1959]: E1213 01:55:38.237623 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.237814 kubelet[1959]: E1213 01:55:38.237795 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.237814 kubelet[1959]: W1213 01:55:38.237805 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.237883 kubelet[1959]: E1213 01:55:38.237816 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.238010 kubelet[1959]: E1213 01:55:38.237991 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.238010 kubelet[1959]: W1213 01:55:38.238006 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.238098 kubelet[1959]: E1213 01:55:38.238037 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.238267 kubelet[1959]: E1213 01:55:38.238239 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.238267 kubelet[1959]: W1213 01:55:38.238255 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.238507 kubelet[1959]: E1213 01:55:38.238318 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.238507 kubelet[1959]: E1213 01:55:38.238412 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.238507 kubelet[1959]: W1213 01:55:38.238419 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.238507 kubelet[1959]: E1213 01:55:38.238430 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.238641 kubelet[1959]: E1213 01:55:38.238556 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.238641 kubelet[1959]: W1213 01:55:38.238564 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.238641 kubelet[1959]: E1213 01:55:38.238573 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.238767 kubelet[1959]: E1213 01:55:38.238678 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.238767 kubelet[1959]: W1213 01:55:38.238700 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.238767 kubelet[1959]: E1213 01:55:38.238709 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.238869 kubelet[1959]: E1213 01:55:38.238833 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.238869 kubelet[1959]: W1213 01:55:38.238841 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.238869 kubelet[1959]: E1213 01:55:38.238849 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.239109 kubelet[1959]: E1213 01:55:38.239093 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.239109 kubelet[1959]: W1213 01:55:38.239105 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.239276 kubelet[1959]: E1213 01:55:38.239119 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.239276 kubelet[1959]: E1213 01:55:38.239271 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.239351 kubelet[1959]: W1213 01:55:38.239279 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.239351 kubelet[1959]: E1213 01:55:38.239293 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.239425 kubelet[1959]: E1213 01:55:38.239414 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.239425 kubelet[1959]: W1213 01:55:38.239422 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.239491 kubelet[1959]: E1213 01:55:38.239431 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.239558 kubelet[1959]: E1213 01:55:38.239540 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.239558 kubelet[1959]: W1213 01:55:38.239551 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.239558 kubelet[1959]: E1213 01:55:38.239559 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.239720 kubelet[1959]: E1213 01:55:38.239701 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.239720 kubelet[1959]: W1213 01:55:38.239714 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.239794 kubelet[1959]: E1213 01:55:38.239725 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.240019 kubelet[1959]: E1213 01:55:38.240002 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:55:38.240019 kubelet[1959]: W1213 01:55:38.240013 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:55:38.240019 kubelet[1959]: E1213 01:55:38.240022 1959 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:55:38.272983 env[1208]: time="2024-12-13T01:55:38.272912943Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:38.274906 env[1208]: time="2024-12-13T01:55:38.274866009Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:38.276271 env[1208]: time="2024-12-13T01:55:38.276238412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:38.277784 env[1208]: time="2024-12-13T01:55:38.277745329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:38.278300 env[1208]: time="2024-12-13T01:55:38.278263414Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 01:55:38.280045 env[1208]: time="2024-12-13T01:55:38.280014360Z" level=info msg="CreateContainer within sandbox \"23f7b82b522f0fcbcf7856f2914dcef6cfb9d393d57207c56cf01e7cb2f172b7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 01:55:38.594673 env[1208]: time="2024-12-13T01:55:38.594630549Z" level=info msg="CreateContainer within sandbox \"23f7b82b522f0fcbcf7856f2914dcef6cfb9d393d57207c56cf01e7cb2f172b7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9aa8fc25cacbc2fcd4a891c89160e8d89f358b1a374604dbbf21fd3ec12236e6\"" Dec 13 01:55:38.595078 env[1208]: time="2024-12-13T01:55:38.595051560Z" level=info msg="StartContainer for \"9aa8fc25cacbc2fcd4a891c89160e8d89f358b1a374604dbbf21fd3ec12236e6\"" Dec 13 01:55:38.620996 systemd[1]: Started cri-containerd-9aa8fc25cacbc2fcd4a891c89160e8d89f358b1a374604dbbf21fd3ec12236e6.scope. Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fca64273908 items=0 ppid=2427 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:38.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613866633235636163626332666364346138393163383931363065 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit: BPF prog-id=130 op=LOAD Dec 13 01:55:38.632000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003aa008 items=0 ppid=2427 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:38.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613866633235636163626332666364346138393163383931363065 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit: BPF prog-id=131 op=LOAD Dec 13 01:55:38.632000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003aa058 items=0 ppid=2427 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:38.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613866633235636163626332666364346138393163383931363065 Dec 13 01:55:38.632000 audit: BPF prog-id=131 op=UNLOAD Dec 13 01:55:38.632000 audit: BPF prog-id=130 op=UNLOAD Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:38.632000 audit: BPF prog-id=132 op=LOAD Dec 13 01:55:38.632000 audit[2575]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003aa0e8 items=0 ppid=2427 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:38.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613866633235636163626332666364346138393163383931363065 Dec 13 01:55:38.651200 systemd[1]: cri-containerd-9aa8fc25cacbc2fcd4a891c89160e8d89f358b1a374604dbbf21fd3ec12236e6.scope: Deactivated successfully. Dec 13 01:55:38.656000 audit: BPF prog-id=132 op=UNLOAD Dec 13 01:55:38.881667 env[1208]: time="2024-12-13T01:55:38.881570099Z" level=info msg="StartContainer for \"9aa8fc25cacbc2fcd4a891c89160e8d89f358b1a374604dbbf21fd3ec12236e6\" returns successfully" Dec 13 01:55:38.895259 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9aa8fc25cacbc2fcd4a891c89160e8d89f358b1a374604dbbf21fd3ec12236e6-rootfs.mount: Deactivated successfully. Dec 13 01:55:38.988778 env[1208]: time="2024-12-13T01:55:38.988710788Z" level=info msg="shim disconnected" id=9aa8fc25cacbc2fcd4a891c89160e8d89f358b1a374604dbbf21fd3ec12236e6 Dec 13 01:55:38.988778 env[1208]: time="2024-12-13T01:55:38.988772124Z" level=warning msg="cleaning up after shim disconnected" id=9aa8fc25cacbc2fcd4a891c89160e8d89f358b1a374604dbbf21fd3ec12236e6 namespace=k8s.io Dec 13 01:55:38.988778 env[1208]: time="2024-12-13T01:55:38.988783295Z" level=info msg="cleaning up dead shim" Dec 13 01:55:38.994632 env[1208]: time="2024-12-13T01:55:38.994589424Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:55:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2616 runtime=io.containerd.runc.v2\n" Dec 13 01:55:39.106466 kubelet[1959]: E1213 01:55:39.106421 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:39.155143 kubelet[1959]: E1213 01:55:39.154990 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:39.156676 env[1208]: time="2024-12-13T01:55:39.156620624Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 01:55:40.305299 kubelet[1959]: I1213 01:55:40.305257 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:55:40.305775 kubelet[1959]: E1213 01:55:40.305600 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:40.326000 audit[2634]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2634 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:40.326000 audit[2634]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdf649ffb0 a2=0 a3=7ffdf649ff9c items=0 ppid=2117 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:40.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:40.330000 audit[2634]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2634 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:40.330000 audit[2634]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdf649ffb0 a2=0 a3=7ffdf649ff9c items=0 ppid=2117 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:40.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:41.106419 kubelet[1959]: E1213 01:55:41.106371 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:41.156541 kubelet[1959]: E1213 01:55:41.156502 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:43.106572 kubelet[1959]: E1213 01:55:43.106523 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:45.106173 kubelet[1959]: E1213 01:55:45.106099 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:46.214176 env[1208]: time="2024-12-13T01:55:46.214124671Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:46.218221 env[1208]: time="2024-12-13T01:55:46.218167680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:46.222172 env[1208]: time="2024-12-13T01:55:46.222129447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:46.227831 env[1208]: time="2024-12-13T01:55:46.227787843Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:46.228730 env[1208]: time="2024-12-13T01:55:46.228674119Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 01:55:46.234498 env[1208]: time="2024-12-13T01:55:46.234453793Z" level=info msg="CreateContainer within sandbox \"23f7b82b522f0fcbcf7856f2914dcef6cfb9d393d57207c56cf01e7cb2f172b7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 01:55:46.250484 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2747660284.mount: Deactivated successfully. Dec 13 01:55:46.254320 env[1208]: time="2024-12-13T01:55:46.254275372Z" level=info msg="CreateContainer within sandbox \"23f7b82b522f0fcbcf7856f2914dcef6cfb9d393d57207c56cf01e7cb2f172b7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e4e47ee1d8e491cd89a936e6f7ba2781e0e200a56c3aed7ba66023d4246ccfbf\"" Dec 13 01:55:46.254765 env[1208]: time="2024-12-13T01:55:46.254745155Z" level=info msg="StartContainer for \"e4e47ee1d8e491cd89a936e6f7ba2781e0e200a56c3aed7ba66023d4246ccfbf\"" Dec 13 01:55:46.274689 systemd[1]: Started cri-containerd-e4e47ee1d8e491cd89a936e6f7ba2781e0e200a56c3aed7ba66023d4246ccfbf.scope. Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.287685 kernel: kauditd_printk_skb: 97 callbacks suppressed Dec 13 01:55:46.287746 kernel: audit: type=1400 audit(1734054946.285:997): avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f175014e7b8 items=0 ppid=2427 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:46.296938 kernel: audit: type=1300 audit(1734054946.285:997): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f175014e7b8 items=0 ppid=2427 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:46.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653437656531643865343931636438396139333665366637626132 Dec 13 01:55:46.301418 kernel: audit: type=1327 audit(1734054946.285:997): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653437656531643865343931636438396139333665366637626132 Dec 13 01:55:46.301488 kernel: audit: type=1400 audit(1734054946.285:998): avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.307309 kernel: audit: type=1400 audit(1734054946.285:998): avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.307357 kernel: audit: type=1400 audit(1734054946.285:998): avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.313338 kernel: audit: type=1400 audit(1734054946.285:998): avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.313407 kernel: audit: type=1400 audit(1734054946.285:998): avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.324473 kernel: audit: type=1400 audit(1734054946.285:998): avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.324548 kernel: audit: type=1400 audit(1734054946.285:998): avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.285000 audit: BPF prog-id=133 op=LOAD Dec 13 01:55:46.285000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000310cf8 items=0 ppid=2427 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:46.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653437656531643865343931636438396139333665366637626132 Dec 13 01:55:46.290000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.290000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.290000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.290000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.290000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.290000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.290000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.290000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.290000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.290000 audit: BPF prog-id=134 op=LOAD Dec 13 01:55:46.290000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000310d48 items=0 ppid=2427 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:46.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653437656531643865343931636438396139333665366637626132 Dec 13 01:55:46.295000 audit: BPF prog-id=134 op=UNLOAD Dec 13 01:55:46.295000 audit: BPF prog-id=133 op=UNLOAD Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:46.295000 audit: BPF prog-id=135 op=LOAD Dec 13 01:55:46.295000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000310dd8 items=0 ppid=2427 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:46.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653437656531643865343931636438396139333665366637626132 Dec 13 01:55:46.604133 env[1208]: time="2024-12-13T01:55:46.604070490Z" level=info msg="StartContainer for \"e4e47ee1d8e491cd89a936e6f7ba2781e0e200a56c3aed7ba66023d4246ccfbf\" returns successfully" Dec 13 01:55:46.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.101:22-10.0.0.1:36132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:46.608226 systemd[1]: Started sshd@7-10.0.0.101:22-10.0.0.1:36132.service. Dec 13 01:55:46.651000 audit[2674]: USER_ACCT pid=2674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:46.653073 sshd[2674]: Accepted publickey for core from 10.0.0.1 port 36132 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:55:46.652000 audit[2674]: CRED_ACQ pid=2674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:46.654113 sshd[2674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:55:46.652000 audit[2674]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cc224b0 a2=3 a3=0 items=0 ppid=1 pid=2674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:46.652000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:55:46.658291 systemd-logind[1195]: New session 8 of user core. Dec 13 01:55:46.658629 systemd[1]: Started session-8.scope. Dec 13 01:55:46.662000 audit[2674]: USER_START pid=2674 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:46.664000 audit[2676]: CRED_ACQ pid=2676 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:47.234058 kubelet[1959]: E1213 01:55:47.234010 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:47.236297 kubelet[1959]: E1213 01:55:47.236262 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:47.373954 sshd[2674]: pam_unix(sshd:session): session closed for user core Dec 13 01:55:47.374000 audit[2674]: USER_END pid=2674 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:47.374000 audit[2674]: CRED_DISP pid=2674 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:47.376539 systemd[1]: sshd@7-10.0.0.101:22-10.0.0.1:36132.service: Deactivated successfully. Dec 13 01:55:47.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.101:22-10.0.0.1:36132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:47.377533 systemd-logind[1195]: Session 8 logged out. Waiting for processes to exit. Dec 13 01:55:47.377568 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 01:55:47.378327 systemd-logind[1195]: Removed session 8. Dec 13 01:55:48.109324 systemd[1]: cri-containerd-e4e47ee1d8e491cd89a936e6f7ba2781e0e200a56c3aed7ba66023d4246ccfbf.scope: Deactivated successfully. Dec 13 01:55:48.114000 audit: BPF prog-id=135 op=UNLOAD Dec 13 01:55:48.126160 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e4e47ee1d8e491cd89a936e6f7ba2781e0e200a56c3aed7ba66023d4246ccfbf-rootfs.mount: Deactivated successfully. Dec 13 01:55:48.180523 kubelet[1959]: I1213 01:55:48.180487 1959 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 01:55:48.250575 kubelet[1959]: E1213 01:55:48.250540 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:48.269703 env[1208]: time="2024-12-13T01:55:48.269660370Z" level=info msg="shim disconnected" id=e4e47ee1d8e491cd89a936e6f7ba2781e0e200a56c3aed7ba66023d4246ccfbf Dec 13 01:55:48.270124 env[1208]: time="2024-12-13T01:55:48.270086761Z" level=warning msg="cleaning up after shim disconnected" id=e4e47ee1d8e491cd89a936e6f7ba2781e0e200a56c3aed7ba66023d4246ccfbf namespace=k8s.io Dec 13 01:55:48.270124 env[1208]: time="2024-12-13T01:55:48.270118761Z" level=info msg="cleaning up dead shim" Dec 13 01:55:48.279159 env[1208]: time="2024-12-13T01:55:48.279094218Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:55:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2701 runtime=io.containerd.runc.v2\n" Dec 13 01:55:48.300179 systemd[1]: Created slice kubepods-besteffort-podb6a83261_02fc_4c35_a45c_8fe683d6b9a9.slice. Dec 13 01:55:48.307545 systemd[1]: Created slice kubepods-burstable-podc10dc66a_6b7f_4bbf_9f8e_5d8c697f6800.slice. Dec 13 01:55:48.312055 systemd[1]: Created slice kubepods-besteffort-podab50393a_0d58_49f1_bac7_62189f4e3a9c.slice. Dec 13 01:55:48.316008 systemd[1]: Created slice kubepods-burstable-pode211f842_4c36_4486_87f0_d3762df943dd.slice. Dec 13 01:55:48.320390 systemd[1]: Created slice kubepods-besteffort-poda8b2255d_4e5d_45ed_9f32_2acef45e1687.slice. Dec 13 01:55:48.422232 kubelet[1959]: I1213 01:55:48.422091 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ab50393a-0d58-49f1-bac7-62189f4e3a9c-calico-apiserver-certs\") pod \"calico-apiserver-5c6d7678b7-dgwgb\" (UID: \"ab50393a-0d58-49f1-bac7-62189f4e3a9c\") " pod="calico-apiserver/calico-apiserver-5c6d7678b7-dgwgb" Dec 13 01:55:48.422232 kubelet[1959]: I1213 01:55:48.422128 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7bh8\" (UniqueName: \"kubernetes.io/projected/a8b2255d-4e5d-45ed-9f32-2acef45e1687-kube-api-access-f7bh8\") pod \"calico-apiserver-5c6d7678b7-qxp2k\" (UID: \"a8b2255d-4e5d-45ed-9f32-2acef45e1687\") " pod="calico-apiserver/calico-apiserver-5c6d7678b7-qxp2k" Dec 13 01:55:48.422232 kubelet[1959]: I1213 01:55:48.422147 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b6a83261-02fc-4c35-a45c-8fe683d6b9a9-tigera-ca-bundle\") pod \"calico-kube-controllers-6987fb549c-zxdvf\" (UID: \"b6a83261-02fc-4c35-a45c-8fe683d6b9a9\") " pod="calico-system/calico-kube-controllers-6987fb549c-zxdvf" Dec 13 01:55:48.422232 kubelet[1959]: I1213 01:55:48.422161 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5kfmr\" (UniqueName: \"kubernetes.io/projected/ab50393a-0d58-49f1-bac7-62189f4e3a9c-kube-api-access-5kfmr\") pod \"calico-apiserver-5c6d7678b7-dgwgb\" (UID: \"ab50393a-0d58-49f1-bac7-62189f4e3a9c\") " pod="calico-apiserver/calico-apiserver-5c6d7678b7-dgwgb" Dec 13 01:55:48.422723 kubelet[1959]: I1213 01:55:48.422660 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800-config-volume\") pod \"coredns-6f6b679f8f-crrdj\" (UID: \"c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800\") " pod="kube-system/coredns-6f6b679f8f-crrdj" Dec 13 01:55:48.422887 kubelet[1959]: I1213 01:55:48.422743 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b256x\" (UniqueName: \"kubernetes.io/projected/e211f842-4c36-4486-87f0-d3762df943dd-kube-api-access-b256x\") pod \"coredns-6f6b679f8f-n56mp\" (UID: \"e211f842-4c36-4486-87f0-d3762df943dd\") " pod="kube-system/coredns-6f6b679f8f-n56mp" Dec 13 01:55:48.422887 kubelet[1959]: I1213 01:55:48.422782 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gnfmk\" (UniqueName: \"kubernetes.io/projected/b6a83261-02fc-4c35-a45c-8fe683d6b9a9-kube-api-access-gnfmk\") pod \"calico-kube-controllers-6987fb549c-zxdvf\" (UID: \"b6a83261-02fc-4c35-a45c-8fe683d6b9a9\") " pod="calico-system/calico-kube-controllers-6987fb549c-zxdvf" Dec 13 01:55:48.422887 kubelet[1959]: I1213 01:55:48.422805 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e211f842-4c36-4486-87f0-d3762df943dd-config-volume\") pod \"coredns-6f6b679f8f-n56mp\" (UID: \"e211f842-4c36-4486-87f0-d3762df943dd\") " pod="kube-system/coredns-6f6b679f8f-n56mp" Dec 13 01:55:48.422887 kubelet[1959]: I1213 01:55:48.422825 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a8b2255d-4e5d-45ed-9f32-2acef45e1687-calico-apiserver-certs\") pod \"calico-apiserver-5c6d7678b7-qxp2k\" (UID: \"a8b2255d-4e5d-45ed-9f32-2acef45e1687\") " pod="calico-apiserver/calico-apiserver-5c6d7678b7-qxp2k" Dec 13 01:55:48.422887 kubelet[1959]: I1213 01:55:48.422845 1959 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bzt5v\" (UniqueName: \"kubernetes.io/projected/c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800-kube-api-access-bzt5v\") pod \"coredns-6f6b679f8f-crrdj\" (UID: \"c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800\") " pod="kube-system/coredns-6f6b679f8f-crrdj" Dec 13 01:55:48.605250 env[1208]: time="2024-12-13T01:55:48.605154174Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6987fb549c-zxdvf,Uid:b6a83261-02fc-4c35-a45c-8fe683d6b9a9,Namespace:calico-system,Attempt:0,}" Dec 13 01:55:48.610387 kubelet[1959]: E1213 01:55:48.610344 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:48.610793 env[1208]: time="2024-12-13T01:55:48.610736093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-crrdj,Uid:c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800,Namespace:kube-system,Attempt:0,}" Dec 13 01:55:48.615473 env[1208]: time="2024-12-13T01:55:48.615432068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c6d7678b7-dgwgb,Uid:ab50393a-0d58-49f1-bac7-62189f4e3a9c,Namespace:calico-apiserver,Attempt:0,}" Dec 13 01:55:48.618684 kubelet[1959]: E1213 01:55:48.618665 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:48.618936 env[1208]: time="2024-12-13T01:55:48.618912759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-n56mp,Uid:e211f842-4c36-4486-87f0-d3762df943dd,Namespace:kube-system,Attempt:0,}" Dec 13 01:55:48.624035 env[1208]: time="2024-12-13T01:55:48.623984490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c6d7678b7-qxp2k,Uid:a8b2255d-4e5d-45ed-9f32-2acef45e1687,Namespace:calico-apiserver,Attempt:0,}" Dec 13 01:55:48.692072 env[1208]: time="2024-12-13T01:55:48.691926537Z" level=error msg="Failed to destroy network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.692292 env[1208]: time="2024-12-13T01:55:48.692261857Z" level=error msg="encountered an error cleaning up failed sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.692357 env[1208]: time="2024-12-13T01:55:48.692311731Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6987fb549c-zxdvf,Uid:b6a83261-02fc-4c35-a45c-8fe683d6b9a9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.692564 kubelet[1959]: E1213 01:55:48.692529 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.692688 kubelet[1959]: E1213 01:55:48.692597 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6987fb549c-zxdvf" Dec 13 01:55:48.692688 kubelet[1959]: E1213 01:55:48.692616 1959 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6987fb549c-zxdvf" Dec 13 01:55:48.692688 kubelet[1959]: E1213 01:55:48.692653 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6987fb549c-zxdvf_calico-system(b6a83261-02fc-4c35-a45c-8fe683d6b9a9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6987fb549c-zxdvf_calico-system(b6a83261-02fc-4c35-a45c-8fe683d6b9a9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6987fb549c-zxdvf" podUID="b6a83261-02fc-4c35-a45c-8fe683d6b9a9" Dec 13 01:55:48.819759 env[1208]: time="2024-12-13T01:55:48.819696043Z" level=error msg="Failed to destroy network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.820045 env[1208]: time="2024-12-13T01:55:48.820011557Z" level=error msg="encountered an error cleaning up failed sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.820080 env[1208]: time="2024-12-13T01:55:48.820061390Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-crrdj,Uid:c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.820326 kubelet[1959]: E1213 01:55:48.820276 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.820326 kubelet[1959]: E1213 01:55:48.820336 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-crrdj" Dec 13 01:55:48.820561 kubelet[1959]: E1213 01:55:48.820355 1959 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-crrdj" Dec 13 01:55:48.820561 kubelet[1959]: E1213 01:55:48.820405 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-crrdj_kube-system(c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-crrdj_kube-system(c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-crrdj" podUID="c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800" Dec 13 01:55:48.986001 env[1208]: time="2024-12-13T01:55:48.985607376Z" level=error msg="Failed to destroy network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.986001 env[1208]: time="2024-12-13T01:55:48.985950731Z" level=error msg="encountered an error cleaning up failed sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.986199 env[1208]: time="2024-12-13T01:55:48.986016825Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-n56mp,Uid:e211f842-4c36-4486-87f0-d3762df943dd,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.986794 kubelet[1959]: E1213 01:55:48.986413 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.986794 kubelet[1959]: E1213 01:55:48.986495 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-n56mp" Dec 13 01:55:48.986794 kubelet[1959]: E1213 01:55:48.986519 1959 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-n56mp" Dec 13 01:55:48.986910 kubelet[1959]: E1213 01:55:48.986569 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-n56mp_kube-system(e211f842-4c36-4486-87f0-d3762df943dd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-n56mp_kube-system(e211f842-4c36-4486-87f0-d3762df943dd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-n56mp" podUID="e211f842-4c36-4486-87f0-d3762df943dd" Dec 13 01:55:48.989178 env[1208]: time="2024-12-13T01:55:48.989133852Z" level=error msg="Failed to destroy network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.989571 env[1208]: time="2024-12-13T01:55:48.989524658Z" level=error msg="encountered an error cleaning up failed sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.989716 env[1208]: time="2024-12-13T01:55:48.989575884Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c6d7678b7-qxp2k,Uid:a8b2255d-4e5d-45ed-9f32-2acef45e1687,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.989786 kubelet[1959]: E1213 01:55:48.989706 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.989786 kubelet[1959]: E1213 01:55:48.989732 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c6d7678b7-qxp2k" Dec 13 01:55:48.989786 kubelet[1959]: E1213 01:55:48.989766 1959 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c6d7678b7-qxp2k" Dec 13 01:55:48.989890 kubelet[1959]: E1213 01:55:48.989789 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5c6d7678b7-qxp2k_calico-apiserver(a8b2255d-4e5d-45ed-9f32-2acef45e1687)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5c6d7678b7-qxp2k_calico-apiserver(a8b2255d-4e5d-45ed-9f32-2acef45e1687)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c6d7678b7-qxp2k" podUID="a8b2255d-4e5d-45ed-9f32-2acef45e1687" Dec 13 01:55:48.991502 env[1208]: time="2024-12-13T01:55:48.991429797Z" level=error msg="Failed to destroy network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.991795 env[1208]: time="2024-12-13T01:55:48.991757955Z" level=error msg="encountered an error cleaning up failed sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.991850 env[1208]: time="2024-12-13T01:55:48.991805634Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c6d7678b7-dgwgb,Uid:ab50393a-0d58-49f1-bac7-62189f4e3a9c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.991984 kubelet[1959]: E1213 01:55:48.991960 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:48.992035 kubelet[1959]: E1213 01:55:48.991990 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c6d7678b7-dgwgb" Dec 13 01:55:48.992035 kubelet[1959]: E1213 01:55:48.992002 1959 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c6d7678b7-dgwgb" Dec 13 01:55:48.992098 kubelet[1959]: E1213 01:55:48.992032 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5c6d7678b7-dgwgb_calico-apiserver(ab50393a-0d58-49f1-bac7-62189f4e3a9c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5c6d7678b7-dgwgb_calico-apiserver(ab50393a-0d58-49f1-bac7-62189f4e3a9c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c6d7678b7-dgwgb" podUID="ab50393a-0d58-49f1-bac7-62189f4e3a9c" Dec 13 01:55:49.110496 systemd[1]: Created slice kubepods-besteffort-podcf8f8d94_2bf0_4200_944d_c1dc194dbbca.slice. Dec 13 01:55:49.112064 env[1208]: time="2024-12-13T01:55:49.112009047Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h6vvx,Uid:cf8f8d94-2bf0-4200-944d-c1dc194dbbca,Namespace:calico-system,Attempt:0,}" Dec 13 01:55:49.126811 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21-shm.mount: Deactivated successfully. Dec 13 01:55:49.254795 kubelet[1959]: E1213 01:55:49.254011 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:55:49.254795 kubelet[1959]: I1213 01:55:49.254530 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:55:49.255169 env[1208]: time="2024-12-13T01:55:49.255144097Z" level=info msg="StopPodSandbox for \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\"" Dec 13 01:55:49.255416 env[1208]: time="2024-12-13T01:55:49.255333173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 01:55:49.256706 kubelet[1959]: I1213 01:55:49.256675 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:55:49.257099 env[1208]: time="2024-12-13T01:55:49.257052012Z" level=info msg="StopPodSandbox for \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\"" Dec 13 01:55:49.258142 kubelet[1959]: I1213 01:55:49.258120 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:55:49.258579 env[1208]: time="2024-12-13T01:55:49.258545498Z" level=info msg="StopPodSandbox for \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\"" Dec 13 01:55:49.259248 kubelet[1959]: I1213 01:55:49.259229 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:55:49.259574 env[1208]: time="2024-12-13T01:55:49.259533895Z" level=info msg="StopPodSandbox for \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\"" Dec 13 01:55:49.260863 kubelet[1959]: I1213 01:55:49.260839 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:55:49.261345 env[1208]: time="2024-12-13T01:55:49.261307027Z" level=info msg="StopPodSandbox for \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\"" Dec 13 01:55:49.302401 env[1208]: time="2024-12-13T01:55:49.302333716Z" level=error msg="StopPodSandbox for \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\" failed" error="failed to destroy network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:49.302918 env[1208]: time="2024-12-13T01:55:49.302483116Z" level=error msg="StopPodSandbox for \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\" failed" error="failed to destroy network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:49.305808 kubelet[1959]: E1213 01:55:49.305592 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:55:49.305808 kubelet[1959]: E1213 01:55:49.305631 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:55:49.305808 kubelet[1959]: E1213 01:55:49.305653 1959 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21"} Dec 13 01:55:49.305808 kubelet[1959]: E1213 01:55:49.305687 1959 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739"} Dec 13 01:55:49.305808 kubelet[1959]: E1213 01:55:49.305728 1959 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e211f842-4c36-4486-87f0-d3762df943dd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:55:49.306084 kubelet[1959]: E1213 01:55:49.305737 1959 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6a83261-02fc-4c35-a45c-8fe683d6b9a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:55:49.306084 kubelet[1959]: E1213 01:55:49.305757 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e211f842-4c36-4486-87f0-d3762df943dd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-n56mp" podUID="e211f842-4c36-4486-87f0-d3762df943dd" Dec 13 01:55:49.306084 kubelet[1959]: E1213 01:55:49.305763 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6a83261-02fc-4c35-a45c-8fe683d6b9a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6987fb549c-zxdvf" podUID="b6a83261-02fc-4c35-a45c-8fe683d6b9a9" Dec 13 01:55:49.317552 env[1208]: time="2024-12-13T01:55:49.317464206Z" level=error msg="StopPodSandbox for \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\" failed" error="failed to destroy network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:49.317750 kubelet[1959]: E1213 01:55:49.317683 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:55:49.317750 kubelet[1959]: E1213 01:55:49.317727 1959 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b"} Dec 13 01:55:49.317899 kubelet[1959]: E1213 01:55:49.317755 1959 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ab50393a-0d58-49f1-bac7-62189f4e3a9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:55:49.317899 kubelet[1959]: E1213 01:55:49.317779 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ab50393a-0d58-49f1-bac7-62189f4e3a9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c6d7678b7-dgwgb" podUID="ab50393a-0d58-49f1-bac7-62189f4e3a9c" Dec 13 01:55:49.327278 env[1208]: time="2024-12-13T01:55:49.327229315Z" level=error msg="StopPodSandbox for \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\" failed" error="failed to destroy network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:49.327583 kubelet[1959]: E1213 01:55:49.327539 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:55:49.327738 kubelet[1959]: E1213 01:55:49.327591 1959 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c"} Dec 13 01:55:49.327738 kubelet[1959]: E1213 01:55:49.327627 1959 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:55:49.327738 kubelet[1959]: E1213 01:55:49.327649 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-crrdj" podUID="c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800" Dec 13 01:55:49.328699 env[1208]: time="2024-12-13T01:55:49.328643642Z" level=error msg="StopPodSandbox for \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\" failed" error="failed to destroy network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:49.328846 kubelet[1959]: E1213 01:55:49.328806 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:55:49.328891 kubelet[1959]: E1213 01:55:49.328858 1959 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb"} Dec 13 01:55:49.328917 kubelet[1959]: E1213 01:55:49.328897 1959 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a8b2255d-4e5d-45ed-9f32-2acef45e1687\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:55:49.328991 kubelet[1959]: E1213 01:55:49.328918 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a8b2255d-4e5d-45ed-9f32-2acef45e1687\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c6d7678b7-qxp2k" podUID="a8b2255d-4e5d-45ed-9f32-2acef45e1687" Dec 13 01:55:49.361030 env[1208]: time="2024-12-13T01:55:49.360962600Z" level=error msg="Failed to destroy network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:49.361346 env[1208]: time="2024-12-13T01:55:49.361313188Z" level=error msg="encountered an error cleaning up failed sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:49.361383 env[1208]: time="2024-12-13T01:55:49.361359705Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h6vvx,Uid:cf8f8d94-2bf0-4200-944d-c1dc194dbbca,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:49.361576 kubelet[1959]: E1213 01:55:49.361538 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:49.361735 kubelet[1959]: E1213 01:55:49.361587 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h6vvx" Dec 13 01:55:49.361735 kubelet[1959]: E1213 01:55:49.361604 1959 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h6vvx" Dec 13 01:55:49.361735 kubelet[1959]: E1213 01:55:49.361638 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-h6vvx_calico-system(cf8f8d94-2bf0-4200-944d-c1dc194dbbca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-h6vvx_calico-system(cf8f8d94-2bf0-4200-944d-c1dc194dbbca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:49.362965 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186-shm.mount: Deactivated successfully. Dec 13 01:55:50.263675 kubelet[1959]: I1213 01:55:50.263639 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:55:50.264234 env[1208]: time="2024-12-13T01:55:50.264176800Z" level=info msg="StopPodSandbox for \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\"" Dec 13 01:55:50.285820 env[1208]: time="2024-12-13T01:55:50.285761673Z" level=error msg="StopPodSandbox for \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\" failed" error="failed to destroy network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:50.286094 kubelet[1959]: E1213 01:55:50.286040 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:55:50.286165 kubelet[1959]: E1213 01:55:50.286095 1959 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186"} Dec 13 01:55:50.286165 kubelet[1959]: E1213 01:55:50.286130 1959 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cf8f8d94-2bf0-4200-944d-c1dc194dbbca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:55:50.286165 kubelet[1959]: E1213 01:55:50.286153 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cf8f8d94-2bf0-4200-944d-c1dc194dbbca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h6vvx" podUID="cf8f8d94-2bf0-4200-944d-c1dc194dbbca" Dec 13 01:55:52.378129 systemd[1]: Started sshd@8-10.0.0.101:22-10.0.0.1:36140.service. Dec 13 01:55:52.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.101:22-10.0.0.1:36140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:52.382220 kernel: kauditd_printk_skb: 45 callbacks suppressed Dec 13 01:55:52.382300 kernel: audit: type=1130 audit(1734054952.377:1013): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.101:22-10.0.0.1:36140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:52.423000 audit[3094]: USER_ACCT pid=3094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.424827 sshd[3094]: Accepted publickey for core from 10.0.0.1 port 36140 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:55:52.427129 sshd[3094]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:55:52.431167 systemd[1]: Started session-9.scope. Dec 13 01:55:52.431681 systemd-logind[1195]: New session 9 of user core. Dec 13 01:55:52.432315 kernel: audit: type=1101 audit(1734054952.423:1014): pid=3094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.425000 audit[3094]: CRED_ACQ pid=3094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.455801 kernel: audit: type=1103 audit(1734054952.425:1015): pid=3094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.455922 kernel: audit: type=1006 audit(1734054952.425:1016): pid=3094 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 01:55:52.456237 kernel: audit: type=1300 audit(1734054952.425:1016): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdafc91920 a2=3 a3=0 items=0 ppid=1 pid=3094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:52.425000 audit[3094]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdafc91920 a2=3 a3=0 items=0 ppid=1 pid=3094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:52.425000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:55:52.486318 kernel: audit: type=1327 audit(1734054952.425:1016): proctitle=737368643A20636F7265205B707269765D Dec 13 01:55:52.434000 audit[3094]: USER_START pid=3094 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.492446 kernel: audit: type=1105 audit(1734054952.434:1017): pid=3094 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.436000 audit[3096]: CRED_ACQ pid=3096 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.498016 kernel: audit: type=1103 audit(1734054952.436:1018): pid=3096 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.568244 sshd[3094]: pam_unix(sshd:session): session closed for user core Dec 13 01:55:52.568000 audit[3094]: USER_END pid=3094 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.570605 systemd[1]: sshd@8-10.0.0.101:22-10.0.0.1:36140.service: Deactivated successfully. Dec 13 01:55:52.571248 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 01:55:52.571709 systemd-logind[1195]: Session 9 logged out. Waiting for processes to exit. Dec 13 01:55:52.572398 systemd-logind[1195]: Removed session 9. Dec 13 01:55:52.568000 audit[3094]: CRED_DISP pid=3094 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.578476 kernel: audit: type=1106 audit(1734054952.568:1019): pid=3094 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.578534 kernel: audit: type=1104 audit(1734054952.568:1020): pid=3094 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:52.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.101:22-10.0.0.1:36140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:57.572594 systemd[1]: Started sshd@9-10.0.0.101:22-10.0.0.1:58848.service. Dec 13 01:55:57.578024 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:55:57.578061 kernel: audit: type=1130 audit(1734054957.571:1022): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.101:22-10.0.0.1:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:57.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.101:22-10.0.0.1:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:57.612000 audit[3111]: USER_ACCT pid=3111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.613621 sshd[3111]: Accepted publickey for core from 10.0.0.1 port 58848 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:55:57.616000 audit[3111]: CRED_ACQ pid=3111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.617905 sshd[3111]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:55:57.625972 kernel: audit: type=1101 audit(1734054957.612:1023): pid=3111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.626088 kernel: audit: type=1103 audit(1734054957.616:1024): pid=3111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.626112 kernel: audit: type=1006 audit(1734054957.616:1025): pid=3111 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 01:55:57.621729 systemd[1]: Started session-10.scope. Dec 13 01:55:57.621993 systemd-logind[1195]: New session 10 of user core. Dec 13 01:55:57.631715 kernel: audit: type=1300 audit(1734054957.616:1025): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff19a99190 a2=3 a3=0 items=0 ppid=1 pid=3111 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:57.631757 kernel: audit: type=1327 audit(1734054957.616:1025): proctitle=737368643A20636F7265205B707269765D Dec 13 01:55:57.616000 audit[3111]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff19a99190 a2=3 a3=0 items=0 ppid=1 pid=3111 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:57.616000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:55:57.625000 audit[3111]: USER_START pid=3111 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.636104 kernel: audit: type=1105 audit(1734054957.625:1026): pid=3111 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.636234 kernel: audit: type=1103 audit(1734054957.626:1027): pid=3113 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.626000 audit[3113]: CRED_ACQ pid=3113 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.744693 sshd[3111]: pam_unix(sshd:session): session closed for user core Dec 13 01:55:57.744000 audit[3111]: USER_END pid=3111 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.746476 systemd[1]: sshd@9-10.0.0.101:22-10.0.0.1:58848.service: Deactivated successfully. Dec 13 01:55:57.747325 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 01:55:57.747376 systemd-logind[1195]: Session 10 logged out. Waiting for processes to exit. Dec 13 01:55:57.748207 systemd-logind[1195]: Removed session 10. Dec 13 01:55:57.744000 audit[3111]: CRED_DISP pid=3111 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.753161 kernel: audit: type=1106 audit(1734054957.744:1028): pid=3111 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.753247 kernel: audit: type=1104 audit(1734054957.744:1029): pid=3111 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:55:57.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.101:22-10.0.0.1:58848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:55:57.890601 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1889350347.mount: Deactivated successfully. Dec 13 01:55:59.511840 env[1208]: time="2024-12-13T01:55:59.511765782Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:59.516361 env[1208]: time="2024-12-13T01:55:59.516307879Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:59.517991 env[1208]: time="2024-12-13T01:55:59.517931718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:59.519574 env[1208]: time="2024-12-13T01:55:59.519530249Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:59.519865 env[1208]: time="2024-12-13T01:55:59.519829431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 01:55:59.528040 env[1208]: time="2024-12-13T01:55:59.527994209Z" level=info msg="CreateContainer within sandbox \"23f7b82b522f0fcbcf7856f2914dcef6cfb9d393d57207c56cf01e7cb2f172b7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 01:55:59.546986 env[1208]: time="2024-12-13T01:55:59.546934008Z" level=info msg="CreateContainer within sandbox \"23f7b82b522f0fcbcf7856f2914dcef6cfb9d393d57207c56cf01e7cb2f172b7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6e795c2db6ca1ef9c56bcc743e0f0ea4baa994156de090bd9153a0cc819277c8\"" Dec 13 01:55:59.547617 env[1208]: time="2024-12-13T01:55:59.547561276Z" level=info msg="StartContainer for \"6e795c2db6ca1ef9c56bcc743e0f0ea4baa994156de090bd9153a0cc819277c8\"" Dec 13 01:55:59.562827 systemd[1]: Started cri-containerd-6e795c2db6ca1ef9c56bcc743e0f0ea4baa994156de090bd9153a0cc819277c8.scope. Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4f0ce8a198 items=0 ppid=2427 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:59.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373935633264623663613165663963353662636337343365306630 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit: BPF prog-id=136 op=LOAD Dec 13 01:55:59.577000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cdc88 items=0 ppid=2427 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:59.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373935633264623663613165663963353662636337343365306630 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit: BPF prog-id=137 op=LOAD Dec 13 01:55:59.577000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002cdcd8 items=0 ppid=2427 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:59.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373935633264623663613165663963353662636337343365306630 Dec 13 01:55:59.577000 audit: BPF prog-id=137 op=UNLOAD Dec 13 01:55:59.577000 audit: BPF prog-id=136 op=UNLOAD Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:59.577000 audit: BPF prog-id=138 op=LOAD Dec 13 01:55:59.577000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002cdd68 items=0 ppid=2427 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:59.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373935633264623663613165663963353662636337343365306630 Dec 13 01:55:59.600200 env[1208]: time="2024-12-13T01:55:59.600113639Z" level=info msg="StartContainer for \"6e795c2db6ca1ef9c56bcc743e0f0ea4baa994156de090bd9153a0cc819277c8\" returns successfully" Dec 13 01:55:59.660870 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 01:55:59.661072 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 01:56:00.107401 env[1208]: time="2024-12-13T01:56:00.107345332Z" level=info msg="StopPodSandbox for \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\"" Dec 13 01:56:00.107401 env[1208]: time="2024-12-13T01:56:00.107358416Z" level=info msg="StopPodSandbox for \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\"" Dec 13 01:56:00.291245 kubelet[1959]: E1213 01:56:00.283295 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:00.305810 kubelet[1959]: I1213 01:56:00.305223 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6vpnr" podStartSLOduration=1.376617606 podStartE2EDuration="27.30519525s" podCreationTimestamp="2024-12-13 01:55:33 +0000 UTC" firstStartedPulling="2024-12-13 01:55:33.592149492 +0000 UTC m=+16.568851291" lastFinishedPulling="2024-12-13 01:55:59.520727136 +0000 UTC m=+42.497428935" observedRunningTime="2024-12-13 01:56:00.297978813 +0000 UTC m=+43.274680612" watchObservedRunningTime="2024-12-13 01:56:00.30519525 +0000 UTC m=+43.281897039" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.242 [INFO][3226] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.243 [INFO][3226] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" iface="eth0" netns="/var/run/netns/cni-224c3b2a-18e8-3d59-0f55-69f5e0f1ba18" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.243 [INFO][3226] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" iface="eth0" netns="/var/run/netns/cni-224c3b2a-18e8-3d59-0f55-69f5e0f1ba18" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.243 [INFO][3226] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" iface="eth0" netns="/var/run/netns/cni-224c3b2a-18e8-3d59-0f55-69f5e0f1ba18" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.243 [INFO][3226] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.243 [INFO][3226] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.299 [INFO][3240] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" HandleID="k8s-pod-network.ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.302 [INFO][3240] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.302 [INFO][3240] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.311 [WARNING][3240] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" HandleID="k8s-pod-network.ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.312 [INFO][3240] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" HandleID="k8s-pod-network.ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.314 [INFO][3240] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:00.322625 env[1208]: 2024-12-13 01:56:00.320 [INFO][3226] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:00.324334 env[1208]: time="2024-12-13T01:56:00.324289226Z" level=info msg="TearDown network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\" successfully" Dec 13 01:56:00.324334 env[1208]: time="2024-12-13T01:56:00.324325845Z" level=info msg="StopPodSandbox for \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\" returns successfully" Dec 13 01:56:00.325175 env[1208]: time="2024-12-13T01:56:00.325138921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c6d7678b7-dgwgb,Uid:ab50393a-0d58-49f1-bac7-62189f4e3a9c,Namespace:calico-apiserver,Attempt:1,}" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.253 [INFO][3225] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.253 [INFO][3225] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" iface="eth0" netns="/var/run/netns/cni-494d2d2d-0a99-aa48-adfb-c301490f222a" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.254 [INFO][3225] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" iface="eth0" netns="/var/run/netns/cni-494d2d2d-0a99-aa48-adfb-c301490f222a" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.254 [INFO][3225] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" iface="eth0" netns="/var/run/netns/cni-494d2d2d-0a99-aa48-adfb-c301490f222a" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.254 [INFO][3225] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.254 [INFO][3225] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.311 [INFO][3245] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" HandleID="k8s-pod-network.43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.311 [INFO][3245] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.314 [INFO][3245] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.319 [WARNING][3245] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" HandleID="k8s-pod-network.43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.319 [INFO][3245] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" HandleID="k8s-pod-network.43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.322 [INFO][3245] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:00.325730 env[1208]: 2024-12-13 01:56:00.324 [INFO][3225] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:00.326258 env[1208]: time="2024-12-13T01:56:00.326213799Z" level=info msg="TearDown network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\" successfully" Dec 13 01:56:00.326342 env[1208]: time="2024-12-13T01:56:00.326321551Z" level=info msg="StopPodSandbox for \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\" returns successfully" Dec 13 01:56:00.326692 kubelet[1959]: E1213 01:56:00.326659 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:00.327250 env[1208]: time="2024-12-13T01:56:00.327177298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-crrdj,Uid:c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800,Namespace:kube-system,Attempt:1,}" Dec 13 01:56:00.525746 systemd[1]: run-netns-cni\x2d224c3b2a\x2d18e8\x2d3d59\x2d0f55\x2d69f5e0f1ba18.mount: Deactivated successfully. Dec 13 01:56:00.525836 systemd[1]: run-netns-cni\x2d494d2d2d\x2d0a99\x2daa48\x2dadfb\x2dc301490f222a.mount: Deactivated successfully. Dec 13 01:56:00.693745 systemd-networkd[1038]: cali4575993a29f: Link UP Dec 13 01:56:00.706479 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:56:00.706593 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4575993a29f: link becomes ready Dec 13 01:56:00.706795 systemd-networkd[1038]: cali4575993a29f: Gained carrier Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.561 [INFO][3292] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.572 [INFO][3292] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--crrdj-eth0 coredns-6f6b679f8f- kube-system c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800 839 0 2024-12-13 01:55:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-crrdj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4575993a29f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-crrdj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--crrdj-" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.572 [INFO][3292] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-crrdj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.595 [INFO][3308] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" HandleID="k8s-pod-network.4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.603 [INFO][3308] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" HandleID="k8s-pod-network.4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cfa0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-crrdj", "timestamp":"2024-12-13 01:56:00.595036967 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.603 [INFO][3308] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.603 [INFO][3308] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.603 [INFO][3308] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.605 [INFO][3308] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" host="localhost" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.608 [INFO][3308] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.610 [INFO][3308] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.612 [INFO][3308] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.613 [INFO][3308] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.613 [INFO][3308] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" host="localhost" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.614 [INFO][3308] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.660 [INFO][3308] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" host="localhost" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.684 [INFO][3308] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" host="localhost" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.685 [INFO][3308] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" host="localhost" Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.685 [INFO][3308] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:00.818153 env[1208]: 2024-12-13 01:56:00.685 [INFO][3308] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" HandleID="k8s-pod-network.4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.819134 env[1208]: 2024-12-13 01:56:00.687 [INFO][3292] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-crrdj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--crrdj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-crrdj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4575993a29f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:00.819134 env[1208]: 2024-12-13 01:56:00.687 [INFO][3292] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-crrdj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.819134 env[1208]: 2024-12-13 01:56:00.687 [INFO][3292] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4575993a29f ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-crrdj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.819134 env[1208]: 2024-12-13 01:56:00.706 [INFO][3292] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-crrdj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.819134 env[1208]: 2024-12-13 01:56:00.707 [INFO][3292] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-crrdj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--crrdj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd", Pod:"coredns-6f6b679f8f-crrdj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4575993a29f", MAC:"d2:7c:8f:8c:42:cd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:00.819134 env[1208]: 2024-12-13 01:56:00.815 [INFO][3292] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-crrdj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:00.830681 env[1208]: time="2024-12-13T01:56:00.830582744Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:56:00.830681 env[1208]: time="2024-12-13T01:56:00.830644250Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:56:00.830681 env[1208]: time="2024-12-13T01:56:00.830658717Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:56:00.832427 env[1208]: time="2024-12-13T01:56:00.831700082Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd pid=3344 runtime=io.containerd.runc.v2 Dec 13 01:56:00.836628 systemd-networkd[1038]: califdd0140b3ab: Link UP Dec 13 01:56:00.838262 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califdd0140b3ab: link becomes ready Dec 13 01:56:00.838343 systemd-networkd[1038]: califdd0140b3ab: Gained carrier Dec 13 01:56:00.851864 systemd[1]: Started cri-containerd-4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd.scope. Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.557 [INFO][3281] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.569 [INFO][3281] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0 calico-apiserver-5c6d7678b7- calico-apiserver ab50393a-0d58-49f1-bac7-62189f4e3a9c 838 0 2024-12-13 01:55:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c6d7678b7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5c6d7678b7-dgwgb eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califdd0140b3ab [] []}} ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-dgwgb" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.569 [INFO][3281] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-dgwgb" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.595 [INFO][3307] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" HandleID="k8s-pod-network.2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.603 [INFO][3307] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" HandleID="k8s-pod-network.2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00038c8d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5c6d7678b7-dgwgb", "timestamp":"2024-12-13 01:56:00.595053199 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.603 [INFO][3307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.685 [INFO][3307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.685 [INFO][3307] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.707 [INFO][3307] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" host="localhost" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.712 [INFO][3307] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.816 [INFO][3307] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.818 [INFO][3307] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.820 [INFO][3307] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.821 [INFO][3307] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" host="localhost" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.822 [INFO][3307] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98 Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.827 [INFO][3307] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" host="localhost" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.832 [INFO][3307] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" host="localhost" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.832 [INFO][3307] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" host="localhost" Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.832 [INFO][3307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:00.853599 env[1208]: 2024-12-13 01:56:00.832 [INFO][3307] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" HandleID="k8s-pod-network.2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.854241 env[1208]: 2024-12-13 01:56:00.834 [INFO][3281] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-dgwgb" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0", GenerateName:"calico-apiserver-5c6d7678b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab50393a-0d58-49f1-bac7-62189f4e3a9c", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c6d7678b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5c6d7678b7-dgwgb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califdd0140b3ab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:00.854241 env[1208]: 2024-12-13 01:56:00.835 [INFO][3281] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-dgwgb" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.854241 env[1208]: 2024-12-13 01:56:00.835 [INFO][3281] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califdd0140b3ab ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-dgwgb" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.854241 env[1208]: 2024-12-13 01:56:00.838 [INFO][3281] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-dgwgb" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.854241 env[1208]: 2024-12-13 01:56:00.839 [INFO][3281] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-dgwgb" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0", GenerateName:"calico-apiserver-5c6d7678b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab50393a-0d58-49f1-bac7-62189f4e3a9c", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c6d7678b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98", Pod:"calico-apiserver-5c6d7678b7-dgwgb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califdd0140b3ab", MAC:"aa:f2:c8:b1:d4:c0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:00.854241 env[1208]: 2024-12-13 01:56:00.851 [INFO][3281] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-dgwgb" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.862000 audit: BPF prog-id=139 op=LOAD Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3344 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465336435306234393033376630326535353539393134666333373364 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3344 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465336435306234393033376630326535353539393134666333373364 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.863000 audit: BPF prog-id=140 op=LOAD Dec 13 01:56:00.863000 audit[3353]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00033a250 items=0 ppid=3344 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465336435306234393033376630326535353539393134666333373364 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit: BPF prog-id=141 op=LOAD Dec 13 01:56:00.864000 audit[3353]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00033a298 items=0 ppid=3344 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465336435306234393033376630326535353539393134666333373364 Dec 13 01:56:00.864000 audit: BPF prog-id=141 op=UNLOAD Dec 13 01:56:00.864000 audit: BPF prog-id=140 op=UNLOAD Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.864000 audit: BPF prog-id=142 op=LOAD Dec 13 01:56:00.864000 audit[3353]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00033a6a8 items=0 ppid=3344 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465336435306234393033376630326535353539393134666333373364 Dec 13 01:56:00.867904 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:56:00.876461 env[1208]: time="2024-12-13T01:56:00.876388667Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:56:00.876461 env[1208]: time="2024-12-13T01:56:00.876460602Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:56:00.876673 env[1208]: time="2024-12-13T01:56:00.876484026Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:56:00.876821 env[1208]: time="2024-12-13T01:56:00.876749734Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98 pid=3418 runtime=io.containerd.runc.v2 Dec 13 01:56:00.902000 audit[3450]: AVC avc: denied { write } for pid=3450 comm="tee" name="fd" dev="proc" ino=23475 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:56:00.902000 audit[3450]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda7763a1b a2=241 a3=1b6 items=1 ppid=3394 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.902000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 01:56:00.902000 audit: PATH item=0 name="/dev/fd/63" inode=24211 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:00.902000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:56:00.912412 env[1208]: time="2024-12-13T01:56:00.912343406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-crrdj,Uid:c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800,Namespace:kube-system,Attempt:1,} returns sandbox id \"4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd\"" Dec 13 01:56:00.911000 audit[3469]: AVC avc: denied { write } for pid=3469 comm="tee" name="fd" dev="proc" ino=24247 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:56:00.911000 audit[3469]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedffeda2a a2=241 a3=1b6 items=1 ppid=3405 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.911000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 01:56:00.911000 audit: PATH item=0 name="/dev/fd/63" inode=24244 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:00.911000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:56:00.913529 kubelet[1959]: E1213 01:56:00.913436 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:00.915545 env[1208]: time="2024-12-13T01:56:00.915496405Z" level=info msg="CreateContainer within sandbox \"4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 01:56:00.923849 systemd[1]: Started cri-containerd-2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98.scope. Dec 13 01:56:00.930000 audit[3436]: AVC avc: denied { write } for pid=3436 comm="tee" name="fd" dev="proc" ino=26134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:56:00.930000 audit[3436]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee6be7a2a a2=241 a3=1b6 items=1 ppid=3395 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.930000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 01:56:00.930000 audit: PATH item=0 name="/dev/fd/63" inode=26103 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:00.930000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:56:00.942000 audit[3500]: AVC avc: denied { write } for pid=3500 comm="tee" name="fd" dev="proc" ino=25069 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:56:00.942000 audit[3500]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff29bfba1a a2=241 a3=1b6 items=1 ppid=3400 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.942000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 01:56:00.942000 audit: PATH item=0 name="/dev/fd/63" inode=23501 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:00.942000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit: BPF prog-id=143 op=LOAD Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3418 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633333323530383062643263383835356465313532646333623333 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3418 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633333323530383062643263383835356465313532646333623333 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit: BPF prog-id=144 op=LOAD Dec 13 01:56:00.943000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00037ed00 items=0 ppid=3418 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633333323530383062643263383835356465313532646333623333 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.943000 audit: BPF prog-id=145 op=LOAD Dec 13 01:56:00.943000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00037ed48 items=0 ppid=3418 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633333323530383062643263383835356465313532646333623333 Dec 13 01:56:00.943000 audit: BPF prog-id=145 op=UNLOAD Dec 13 01:56:00.943000 audit: BPF prog-id=144 op=UNLOAD Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:00.944000 audit: BPF prog-id=146 op=LOAD Dec 13 01:56:00.944000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00037f158 items=0 ppid=3418 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633333323530383062643263383835356465313532646333623333 Dec 13 01:56:00.945000 audit[3474]: AVC avc: denied { write } for pid=3474 comm="tee" name="fd" dev="proc" ino=26148 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:56:00.945000 audit[3474]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe0826a2c a2=241 a3=1b6 items=1 ppid=3387 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.945000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 01:56:00.945000 audit: PATH item=0 name="/dev/fd/63" inode=25062 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:00.945000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:56:00.947822 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:56:00.960000 audit[3484]: AVC avc: denied { write } for pid=3484 comm="tee" name="fd" dev="proc" ino=24269 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:56:00.960000 audit[3484]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7b1d4a2b a2=241 a3=1b6 items=1 ppid=3390 pid=3484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.960000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 01:56:00.960000 audit: PATH item=0 name="/dev/fd/63" inode=24253 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:00.960000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:56:00.976000 audit[3507]: AVC avc: denied { write } for pid=3507 comm="tee" name="fd" dev="proc" ino=23538 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:56:00.976000 audit[3507]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca3a70a2a a2=241 a3=1b6 items=1 ppid=3402 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:00.976000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 01:56:00.976000 audit: PATH item=0 name="/dev/fd/63" inode=24260 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:00.976000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:56:00.984406 env[1208]: time="2024-12-13T01:56:00.984365574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c6d7678b7-dgwgb,Uid:ab50393a-0d58-49f1-bac7-62189f4e3a9c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98\"" Dec 13 01:56:00.986248 env[1208]: time="2024-12-13T01:56:00.986217852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 01:56:01.057689 env[1208]: time="2024-12-13T01:56:01.057645860Z" level=info msg="CreateContainer within sandbox \"4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"70b6c981a151de517c12064ee1b3b879de9fb7cef3925b0437bde2d7fe68c981\"" Dec 13 01:56:01.058621 env[1208]: time="2024-12-13T01:56:01.058598418Z" level=info msg="StartContainer for \"70b6c981a151de517c12064ee1b3b879de9fb7cef3925b0437bde2d7fe68c981\"" Dec 13 01:56:01.076603 systemd[1]: Started cri-containerd-70b6c981a151de517c12064ee1b3b879de9fb7cef3925b0437bde2d7fe68c981.scope. Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit: BPF prog-id=147 op=LOAD Dec 13 01:56:01.092000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff2c975fa0 a2=98 a3=3 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.092000 audit: BPF prog-id=147 op=UNLOAD Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit: BPF prog-id=148 op=LOAD Dec 13 01:56:01.092000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff2c975d80 a2=74 a3=540051 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.092000 audit: BPF prog-id=148 op=UNLOAD Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.092000 audit: BPF prog-id=149 op=LOAD Dec 13 01:56:01.092000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff2c975db0 a2=94 a3=2 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.092000 audit: BPF prog-id=149 op=UNLOAD Dec 13 01:56:01.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.100000 audit: BPF prog-id=150 op=LOAD Dec 13 01:56:01.100000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.100000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3344 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730623663393831613135316465353137633132303634656531623362 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3344 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730623663393831613135316465353137633132303634656531623362 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.101000 audit: BPF prog-id=151 op=LOAD Dec 13 01:56:01.101000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024a90 items=0 ppid=3344 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730623663393831613135316465353137633132303634656531623362 Dec 13 01:56:01.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.102000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.102000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.102000 audit: BPF prog-id=152 op=LOAD Dec 13 01:56:01.102000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ad8 items=0 ppid=3344 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730623663393831613135316465353137633132303634656531623362 Dec 13 01:56:01.103000 audit: BPF prog-id=152 op=UNLOAD Dec 13 01:56:01.103000 audit: BPF prog-id=151 op=UNLOAD Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.103000 audit: BPF prog-id=153 op=LOAD Dec 13 01:56:01.103000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024ee8 items=0 ppid=3344 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730623663393831613135316465353137633132303634656531623362 Dec 13 01:56:01.107086 env[1208]: time="2024-12-13T01:56:01.107058378Z" level=info msg="StopPodSandbox for \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\"" Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit: BPF prog-id=154 op=LOAD Dec 13 01:56:01.203000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff2c975c70 a2=40 a3=1 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.203000 audit: BPF prog-id=154 op=UNLOAD Dec 13 01:56:01.203000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.203000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff2c975d40 a2=50 a3=7fff2c975e20 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2c975c80 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2c975cb0 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2c975bc0 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2c975cd0 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2c975cb0 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2c975ca0 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2c975cd0 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2c975cb0 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2c975cd0 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2c975ca0 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2c975d10 a2=28 a3=0 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff2c975ac0 a2=50 a3=1 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit: BPF prog-id=155 op=LOAD Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff2c975ac0 a2=94 a3=5 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit: BPF prog-id=155 op=UNLOAD Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff2c975b70 a2=50 a3=1 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff2c975c90 a2=4 a3=38 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.210000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:01.210000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff2c975ce0 a2=94 a3=6 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.210000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:01.211000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff2c975490 a2=94 a3=83 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.211000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:01.211000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff2c975490 a2=94 a3=83 items=0 ppid=3451 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit: BPF prog-id=156 op=LOAD Dec 13 01:56:01.217000 audit[3613]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc740cb600 a2=98 a3=1999999999999999 items=0 ppid=3451 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.217000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:56:01.217000 audit: BPF prog-id=156 op=UNLOAD Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit: BPF prog-id=157 op=LOAD Dec 13 01:56:01.217000 audit[3613]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc740cb4e0 a2=74 a3=ffff items=0 ppid=3451 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.217000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:56:01.217000 audit: BPF prog-id=157 op=UNLOAD Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.217000 audit: BPF prog-id=158 op=LOAD Dec 13 01:56:01.217000 audit[3613]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc740cb520 a2=40 a3=7ffc740cb700 items=0 ppid=3451 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.217000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:56:01.217000 audit: BPF prog-id=158 op=UNLOAD Dec 13 01:56:01.266000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.266000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.266000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.266000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.266000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.266000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.266000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.266000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.266000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.266000 audit: BPF prog-id=159 op=LOAD Dec 13 01:56:01.266000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe392a8a00 a2=98 a3=ffffffff items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit: BPF prog-id=159 op=UNLOAD Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit: BPF prog-id=160 op=LOAD Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe392a8810 a2=74 a3=540051 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit: BPF prog-id=160 op=UNLOAD Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit: BPF prog-id=161 op=LOAD Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe392a8840 a2=94 a3=2 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit: BPF prog-id=161 op=UNLOAD Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe392a8710 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe392a8740 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe392a8650 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe392a8760 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe392a8740 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe392a8730 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe392a8760 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe392a8740 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe392a8760 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe392a8730 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe392a87a0 a2=28 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.267000 audit: BPF prog-id=162 op=LOAD Dec 13 01:56:01.267000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe392a8610 a2=40 a3=0 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.267000 audit: BPF prog-id=162 op=UNLOAD Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe392a8600 a2=50 a3=2800 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe392a8600 a2=50 a3=2800 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit: BPF prog-id=163 op=LOAD Dec 13 01:56:01.268000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe392a7e20 a2=94 a3=2 items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.268000 audit: BPF prog-id=163 op=UNLOAD Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.268000 audit: BPF prog-id=164 op=LOAD Dec 13 01:56:01.268000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe392a7f20 a2=94 a3=2d items=0 ppid=3451 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit: BPF prog-id=165 op=LOAD Dec 13 01:56:01.270000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee75e59d0 a2=98 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.270000 audit: BPF prog-id=165 op=UNLOAD Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit: BPF prog-id=166 op=LOAD Dec 13 01:56:01.270000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee75e57b0 a2=74 a3=540051 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.270000 audit: BPF prog-id=166 op=UNLOAD Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.270000 audit: BPF prog-id=167 op=LOAD Dec 13 01:56:01.270000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee75e57e0 a2=94 a3=2 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.270000 audit: BPF prog-id=167 op=UNLOAD Dec 13 01:56:01.255003 systemd-networkd[1038]: vxlan.calico: Link UP Dec 13 01:56:01.255007 systemd-networkd[1038]: vxlan.calico: Gained carrier Dec 13 01:56:01.346523 env[1208]: time="2024-12-13T01:56:01.340212451Z" level=info msg="StartContainer for \"70b6c981a151de517c12064ee1b3b879de9fb7cef3925b0437bde2d7fe68c981\" returns successfully" Dec 13 01:56:01.346632 kubelet[1959]: E1213 01:56:01.345078 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:01.346632 kubelet[1959]: E1213 01:56:01.345290 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit: BPF prog-id=168 op=LOAD Dec 13 01:56:01.398000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee75e56a0 a2=40 a3=1 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.398000 audit: BPF prog-id=168 op=UNLOAD Dec 13 01:56:01.398000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.398000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffee75e5770 a2=50 a3=7ffee75e5850 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.342 [INFO][3597] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.343 [INFO][3597] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" iface="eth0" netns="/var/run/netns/cni-553587a4-a28e-a563-b84c-8089f2e1df27" Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.343 [INFO][3597] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" iface="eth0" netns="/var/run/netns/cni-553587a4-a28e-a563-b84c-8089f2e1df27" Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.343 [INFO][3597] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" iface="eth0" netns="/var/run/netns/cni-553587a4-a28e-a563-b84c-8089f2e1df27" Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.343 [INFO][3597] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.343 [INFO][3597] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.394 [INFO][3650] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" HandleID="k8s-pod-network.f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.394 [INFO][3650] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.394 [INFO][3650] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.401 [WARNING][3650] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" HandleID="k8s-pod-network.f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.402 [INFO][3650] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" HandleID="k8s-pod-network.f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.403 [INFO][3650] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:01.406711 env[1208]: 2024-12-13 01:56:01.405 [INFO][3597] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee75e56b0 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee75e56e0 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee75e55f0 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee75e5700 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee75e56e0 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee75e56d0 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee75e5700 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee75e56e0 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee75e5700 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee75e56d0 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.405000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.405000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee75e5740 a2=28 a3=0 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee75e54f0 a2=50 a3=1 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit: BPF prog-id=169 op=LOAD Dec 13 01:56:01.406000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee75e54f0 a2=94 a3=5 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.406000 audit: BPF prog-id=169 op=UNLOAD Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee75e55a0 a2=50 a3=1 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffee75e56c0 a2=4 a3=38 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { confidentiality } for pid=3642 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:01.406000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee75e5710 a2=94 a3=6 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { confidentiality } for pid=3642 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:01.406000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee75e4ec0 a2=94 a3=83 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.406000 audit[3642]: AVC avc: denied { confidentiality } for pid=3642 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:01.406000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee75e4ec0 a2=94 a3=83 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.407000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.407000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee75e6900 a2=10 a3=208 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.407000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.407000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.407000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee75e67a0 a2=10 a3=3 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.407000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.407000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.407000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee75e6740 a2=10 a3=3 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.407000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.407000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.407000 audit[3642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee75e6740 a2=10 a3=7 items=0 ppid=3451 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.407000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:56:01.410947 env[1208]: time="2024-12-13T01:56:01.410912632Z" level=info msg="TearDown network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\" successfully" Dec 13 01:56:01.411024 env[1208]: time="2024-12-13T01:56:01.411004594Z" level=info msg="StopPodSandbox for \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\" returns successfully" Dec 13 01:56:01.411720 env[1208]: time="2024-12-13T01:56:01.411701212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h6vvx,Uid:cf8f8d94-2bf0-4200-944d-c1dc194dbbca,Namespace:calico-system,Attempt:1,}" Dec 13 01:56:01.416000 audit: BPF prog-id=164 op=UNLOAD Dec 13 01:56:01.461000 audit[3711]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:56:01.461000 audit[3711]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffeefbaaea0 a2=0 a3=7ffeefbaae8c items=0 ppid=3451 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.461000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:56:01.465000 audit[3710]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:56:01.465000 audit[3710]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe999b8270 a2=0 a3=7ffe999b825c items=0 ppid=3451 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.465000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:56:01.467000 audit[3714]: NETFILTER_CFG table=filter:99 family=2 entries=105 op=nft_register_chain pid=3714 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:56:01.467000 audit[3714]: SYSCALL arch=c000003e syscall=46 success=yes exit=58184 a0=3 a1=7fff44711560 a2=0 a3=7fff4471154c items=0 ppid=3451 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.467000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:56:01.470000 audit[3709]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3709 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:56:01.470000 audit[3709]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe3dcdcee0 a2=0 a3=7ffe3dcdcecc items=0 ppid=3451 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.470000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:56:01.489000 audit[3696]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=3696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:01.489000 audit[3696]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffeb0b57220 a2=0 a3=7ffeb0b5720c items=0 ppid=2117 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:01.503000 audit[3696]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=3696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:01.503000 audit[3696]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffeb0b57220 a2=0 a3=0 items=0 ppid=2117 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:01.527713 systemd[1]: run-netns-cni\x2d553587a4\x2da28e\x2da563\x2db84c\x2d8089f2e1df27.mount: Deactivated successfully. Dec 13 01:56:01.862917 systemd-networkd[1038]: cali8f858ea1f05: Link UP Dec 13 01:56:01.864528 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8f858ea1f05: link becomes ready Dec 13 01:56:01.864228 systemd-networkd[1038]: cali8f858ea1f05: Gained carrier Dec 13 01:56:01.871514 kubelet[1959]: I1213 01:56:01.871461 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-crrdj" podStartSLOduration=37.871441808 podStartE2EDuration="37.871441808s" podCreationTimestamp="2024-12-13 01:55:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:56:01.370458169 +0000 UTC m=+44.347159978" watchObservedRunningTime="2024-12-13 01:56:01.871441808 +0000 UTC m=+44.848143597" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.792 [INFO][3720] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--h6vvx-eth0 csi-node-driver- calico-system cf8f8d94-2bf0-4200-944d-c1dc194dbbca 861 0 2024-12-13 01:55:33 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-h6vvx eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali8f858ea1f05 [] []}} ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Namespace="calico-system" Pod="csi-node-driver-h6vvx" WorkloadEndpoint="localhost-k8s-csi--node--driver--h6vvx-" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.792 [INFO][3720] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Namespace="calico-system" Pod="csi-node-driver-h6vvx" WorkloadEndpoint="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.829 [INFO][3737] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" HandleID="k8s-pod-network.3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.836 [INFO][3737] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" HandleID="k8s-pod-network.3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000503480), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-h6vvx", "timestamp":"2024-12-13 01:56:01.829256457 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.837 [INFO][3737] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.837 [INFO][3737] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.837 [INFO][3737] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.838 [INFO][3737] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" host="localhost" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.841 [INFO][3737] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.844 [INFO][3737] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.847 [INFO][3737] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.848 [INFO][3737] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.848 [INFO][3737] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" host="localhost" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.850 [INFO][3737] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.852 [INFO][3737] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" host="localhost" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.858 [INFO][3737] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" host="localhost" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.858 [INFO][3737] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" host="localhost" Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.859 [INFO][3737] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:01.873859 env[1208]: 2024-12-13 01:56:01.859 [INFO][3737] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" HandleID="k8s-pod-network.3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.874712 env[1208]: 2024-12-13 01:56:01.860 [INFO][3720] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Namespace="calico-system" Pod="csi-node-driver-h6vvx" WorkloadEndpoint="localhost-k8s-csi--node--driver--h6vvx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--h6vvx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cf8f8d94-2bf0-4200-944d-c1dc194dbbca", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-h6vvx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8f858ea1f05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:01.874712 env[1208]: 2024-12-13 01:56:01.860 [INFO][3720] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Namespace="calico-system" Pod="csi-node-driver-h6vvx" WorkloadEndpoint="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.874712 env[1208]: 2024-12-13 01:56:01.860 [INFO][3720] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8f858ea1f05 ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Namespace="calico-system" Pod="csi-node-driver-h6vvx" WorkloadEndpoint="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.874712 env[1208]: 2024-12-13 01:56:01.864 [INFO][3720] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Namespace="calico-system" Pod="csi-node-driver-h6vvx" WorkloadEndpoint="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.874712 env[1208]: 2024-12-13 01:56:01.864 [INFO][3720] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Namespace="calico-system" Pod="csi-node-driver-h6vvx" WorkloadEndpoint="localhost-k8s-csi--node--driver--h6vvx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--h6vvx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cf8f8d94-2bf0-4200-944d-c1dc194dbbca", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a", Pod:"csi-node-driver-h6vvx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8f858ea1f05", MAC:"fe:b9:e3:e0:dd:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:01.874712 env[1208]: 2024-12-13 01:56:01.871 [INFO][3720] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a" Namespace="calico-system" Pod="csi-node-driver-h6vvx" WorkloadEndpoint="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:01.880000 audit[3759]: NETFILTER_CFG table=filter:103 family=2 entries=42 op=nft_register_chain pid=3759 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:56:01.880000 audit[3759]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7fff19ae6260 a2=0 a3=7fff19ae624c items=0 ppid=3451 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.880000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:56:01.884354 env[1208]: time="2024-12-13T01:56:01.884284326Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:56:01.884354 env[1208]: time="2024-12-13T01:56:01.884321957Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:56:01.884354 env[1208]: time="2024-12-13T01:56:01.884332917Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:56:01.884550 env[1208]: time="2024-12-13T01:56:01.884511492Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a pid=3767 runtime=io.containerd.runc.v2 Dec 13 01:56:01.896472 systemd[1]: Started cri-containerd-3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a.scope. Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit: BPF prog-id=170 op=LOAD Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3767 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362386561623534313339373232383238653363363338613331666535 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3767 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362386561623534313339373232383238653363363338613331666535 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.903000 audit: BPF prog-id=171 op=LOAD Dec 13 01:56:01.903000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00032ab80 items=0 ppid=3767 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362386561623534313339373232383238653363363338613331666535 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit: BPF prog-id=172 op=LOAD Dec 13 01:56:01.904000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00032abc8 items=0 ppid=3767 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362386561623534313339373232383238653363363338613331666535 Dec 13 01:56:01.904000 audit: BPF prog-id=172 op=UNLOAD Dec 13 01:56:01.904000 audit: BPF prog-id=171 op=UNLOAD Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:01.904000 audit: BPF prog-id=173 op=LOAD Dec 13 01:56:01.904000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00032afd8 items=0 ppid=3767 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:01.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362386561623534313339373232383238653363363338613331666535 Dec 13 01:56:01.906693 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:56:01.917773 env[1208]: time="2024-12-13T01:56:01.917723169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h6vvx,Uid:cf8f8d94-2bf0-4200-944d-c1dc194dbbca,Namespace:calico-system,Attempt:1,} returns sandbox id \"3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a\"" Dec 13 01:56:02.007311 systemd-networkd[1038]: califdd0140b3ab: Gained IPv6LL Dec 13 01:56:02.106854 env[1208]: time="2024-12-13T01:56:02.106822951Z" level=info msg="StopPodSandbox for \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\"" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.147 [INFO][3818] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.147 [INFO][3818] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" iface="eth0" netns="/var/run/netns/cni-93a380c0-82cd-c11c-aee9-b2b5de75917a" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.147 [INFO][3818] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" iface="eth0" netns="/var/run/netns/cni-93a380c0-82cd-c11c-aee9-b2b5de75917a" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.147 [INFO][3818] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" iface="eth0" netns="/var/run/netns/cni-93a380c0-82cd-c11c-aee9-b2b5de75917a" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.147 [INFO][3818] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.147 [INFO][3818] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.164 [INFO][3826] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" HandleID="k8s-pod-network.0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.164 [INFO][3826] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.164 [INFO][3826] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.171 [WARNING][3826] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" HandleID="k8s-pod-network.0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.171 [INFO][3826] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" HandleID="k8s-pod-network.0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.172 [INFO][3826] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:02.175129 env[1208]: 2024-12-13 01:56:02.173 [INFO][3818] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:02.175659 env[1208]: time="2024-12-13T01:56:02.175205855Z" level=info msg="TearDown network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\" successfully" Dec 13 01:56:02.175659 env[1208]: time="2024-12-13T01:56:02.175237044Z" level=info msg="StopPodSandbox for \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\" returns successfully" Dec 13 01:56:02.176206 env[1208]: time="2024-12-13T01:56:02.176044240Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c6d7678b7-qxp2k,Uid:a8b2255d-4e5d-45ed-9f32-2acef45e1687,Namespace:calico-apiserver,Attempt:1,}" Dec 13 01:56:02.275207 systemd-networkd[1038]: cali7a2be6c24ed: Link UP Dec 13 01:56:02.276765 systemd-networkd[1038]: cali7a2be6c24ed: Gained carrier Dec 13 01:56:02.277233 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7a2be6c24ed: link becomes ready Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.211 [INFO][3835] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0 calico-apiserver-5c6d7678b7- calico-apiserver a8b2255d-4e5d-45ed-9f32-2acef45e1687 879 0 2024-12-13 01:55:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c6d7678b7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5c6d7678b7-qxp2k eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7a2be6c24ed [] []}} ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-qxp2k" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.211 [INFO][3835] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-qxp2k" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.239 [INFO][3848] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" HandleID="k8s-pod-network.3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.249 [INFO][3848] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" HandleID="k8s-pod-network.3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dfb00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5c6d7678b7-qxp2k", "timestamp":"2024-12-13 01:56:02.239917367 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.249 [INFO][3848] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.249 [INFO][3848] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.249 [INFO][3848] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.251 [INFO][3848] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" host="localhost" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.254 [INFO][3848] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.257 [INFO][3848] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.259 [INFO][3848] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.261 [INFO][3848] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.261 [INFO][3848] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" host="localhost" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.262 [INFO][3848] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.266 [INFO][3848] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" host="localhost" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.272 [INFO][3848] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" host="localhost" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.272 [INFO][3848] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" host="localhost" Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.272 [INFO][3848] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:02.292288 env[1208]: 2024-12-13 01:56:02.272 [INFO][3848] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" HandleID="k8s-pod-network.3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.292989 env[1208]: 2024-12-13 01:56:02.273 [INFO][3835] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-qxp2k" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0", GenerateName:"calico-apiserver-5c6d7678b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8b2255d-4e5d-45ed-9f32-2acef45e1687", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c6d7678b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5c6d7678b7-qxp2k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7a2be6c24ed", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:02.292989 env[1208]: 2024-12-13 01:56:02.274 [INFO][3835] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-qxp2k" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.292989 env[1208]: 2024-12-13 01:56:02.274 [INFO][3835] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7a2be6c24ed ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-qxp2k" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.292989 env[1208]: 2024-12-13 01:56:02.276 [INFO][3835] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-qxp2k" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.292989 env[1208]: 2024-12-13 01:56:02.277 [INFO][3835] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-qxp2k" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0", GenerateName:"calico-apiserver-5c6d7678b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8b2255d-4e5d-45ed-9f32-2acef45e1687", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c6d7678b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced", Pod:"calico-apiserver-5c6d7678b7-qxp2k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7a2be6c24ed", MAC:"22:84:81:47:81:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:02.292989 env[1208]: 2024-12-13 01:56:02.284 [INFO][3835] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced" Namespace="calico-apiserver" Pod="calico-apiserver-5c6d7678b7-qxp2k" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:02.294000 audit[3859]: NETFILTER_CFG table=filter:104 family=2 entries=42 op=nft_register_chain pid=3859 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:56:02.294000 audit[3859]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffd516caa80 a2=0 a3=7ffd516caa6c items=0 ppid=3451 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.294000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:56:02.304967 env[1208]: time="2024-12-13T01:56:02.304886303Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:56:02.304967 env[1208]: time="2024-12-13T01:56:02.304929985Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:56:02.304967 env[1208]: time="2024-12-13T01:56:02.304940825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:56:02.305164 env[1208]: time="2024-12-13T01:56:02.305125862Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced pid=3878 runtime=io.containerd.runc.v2 Dec 13 01:56:02.314916 systemd[1]: Started cri-containerd-3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced.scope. Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.324000 audit: BPF prog-id=174 op=LOAD Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3878 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365616630333834393764616339393633313062653362646436663062 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3878 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365616630333834393764616339393633313062653362646436663062 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.325000 audit: BPF prog-id=175 op=LOAD Dec 13 01:56:02.325000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323a60 items=0 ppid=3878 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365616630333834393764616339393633313062653362646436663062 Dec 13 01:56:02.326000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.326000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.326000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.326000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.326000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.326000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.326000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.326000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.326000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.326000 audit: BPF prog-id=176 op=LOAD Dec 13 01:56:02.326000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323aa8 items=0 ppid=3878 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365616630333834393764616339393633313062653362646436663062 Dec 13 01:56:02.326000 audit: BPF prog-id=176 op=UNLOAD Dec 13 01:56:02.327000 audit: BPF prog-id=175 op=UNLOAD Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:02.327000 audit: BPF prog-id=177 op=LOAD Dec 13 01:56:02.327000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323eb8 items=0 ppid=3878 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365616630333834393764616339393633313062653362646436663062 Dec 13 01:56:02.329481 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:56:02.347560 kubelet[1959]: E1213 01:56:02.347462 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:02.350091 env[1208]: time="2024-12-13T01:56:02.348834379Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c6d7678b7-qxp2k,Uid:a8b2255d-4e5d-45ed-9f32-2acef45e1687,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced\"" Dec 13 01:56:02.369000 audit[3912]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:02.369000 audit[3912]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd9c4babc0 a2=0 a3=7ffd9c4babac items=0 ppid=2117 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:02.376000 audit[3912]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:02.376000 audit[3912]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd9c4babc0 a2=0 a3=7ffd9c4babac items=0 ppid=2117 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:02.455361 systemd-networkd[1038]: vxlan.calico: Gained IPv6LL Dec 13 01:56:02.527552 systemd[1]: run-netns-cni\x2d93a380c0\x2d82cd\x2dc11c\x2daee9\x2db2b5de75917a.mount: Deactivated successfully. Dec 13 01:56:02.583326 systemd-networkd[1038]: cali4575993a29f: Gained IPv6LL Dec 13 01:56:02.749461 kernel: kauditd_printk_skb: 862 callbacks suppressed Dec 13 01:56:02.749580 kernel: audit: type=1130 audit(1734054962.747:1235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.101:22-10.0.0.1:58860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:02.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.101:22-10.0.0.1:58860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:02.748344 systemd[1]: Started sshd@10-10.0.0.101:22-10.0.0.1:58860.service. Dec 13 01:56:02.903000 audit[3915]: USER_ACCT pid=3915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:02.905315 sshd[3915]: Accepted publickey for core from 10.0.0.1 port 58860 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:02.907860 sshd[3915]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:02.906000 audit[3915]: CRED_ACQ pid=3915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:02.914904 kernel: audit: type=1101 audit(1734054962.903:1236): pid=3915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:02.914979 kernel: audit: type=1103 audit(1734054962.906:1237): pid=3915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:02.914999 kernel: audit: type=1006 audit(1734054962.906:1238): pid=3915 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 01:56:02.912588 systemd[1]: Started session-11.scope. Dec 13 01:56:02.912863 systemd-logind[1195]: New session 11 of user core. Dec 13 01:56:02.906000 audit[3915]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdc3f9530 a2=3 a3=0 items=0 ppid=1 pid=3915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.906000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:02.920742 kernel: audit: type=1300 audit(1734054962.906:1238): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdc3f9530 a2=3 a3=0 items=0 ppid=1 pid=3915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:02.920787 kernel: audit: type=1327 audit(1734054962.906:1238): proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:02.920802 kernel: audit: type=1105 audit(1734054962.916:1239): pid=3915 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:02.916000 audit[3915]: USER_START pid=3915 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:02.917000 audit[3918]: CRED_ACQ pid=3918 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:02.928457 kernel: audit: type=1103 audit(1734054962.917:1240): pid=3918 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.033624 sshd[3915]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:03.037531 systemd[1]: Started sshd@11-10.0.0.101:22-10.0.0.1:58870.service. Dec 13 01:56:03.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.101:22-10.0.0.1:58870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:03.047066 kernel: audit: type=1130 audit(1734054963.036:1241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.101:22-10.0.0.1:58870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:03.047130 kernel: audit: type=1106 audit(1734054963.040:1242): pid=3915 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.040000 audit[3915]: USER_END pid=3915 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.046000 audit[3915]: CRED_DISP pid=3915 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.048646 systemd[1]: sshd@10-10.0.0.101:22-10.0.0.1:58860.service: Deactivated successfully. Dec 13 01:56:03.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.101:22-10.0.0.1:58860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:03.049210 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 01:56:03.049996 systemd-logind[1195]: Session 11 logged out. Waiting for processes to exit. Dec 13 01:56:03.050730 systemd-logind[1195]: Removed session 11. Dec 13 01:56:03.076000 audit[3930]: USER_ACCT pid=3930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.078338 sshd[3930]: Accepted publickey for core from 10.0.0.1 port 58870 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:03.077000 audit[3930]: CRED_ACQ pid=3930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.078000 audit[3930]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0bce65b0 a2=3 a3=0 items=0 ppid=1 pid=3930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.078000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:03.079439 sshd[3930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:03.082690 systemd-logind[1195]: New session 12 of user core. Dec 13 01:56:03.083513 systemd[1]: Started session-12.scope. Dec 13 01:56:03.086000 audit[3930]: USER_START pid=3930 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.088000 audit[3933]: CRED_ACQ pid=3933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.114214 env[1208]: time="2024-12-13T01:56:03.114142213Z" level=info msg="StopPodSandbox for \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\"" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.171 [INFO][3950] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.171 [INFO][3950] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" iface="eth0" netns="/var/run/netns/cni-e94fda19-3b30-ef82-43e4-c4fc164362e9" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.171 [INFO][3950] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" iface="eth0" netns="/var/run/netns/cni-e94fda19-3b30-ef82-43e4-c4fc164362e9" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.171 [INFO][3950] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" iface="eth0" netns="/var/run/netns/cni-e94fda19-3b30-ef82-43e4-c4fc164362e9" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.171 [INFO][3950] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.171 [INFO][3950] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.195 [INFO][3963] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" HandleID="k8s-pod-network.f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.196 [INFO][3963] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.196 [INFO][3963] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.202 [WARNING][3963] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" HandleID="k8s-pod-network.f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.202 [INFO][3963] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" HandleID="k8s-pod-network.f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.203 [INFO][3963] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:03.207016 env[1208]: 2024-12-13 01:56:03.205 [INFO][3950] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:03.207662 env[1208]: time="2024-12-13T01:56:03.207165941Z" level=info msg="TearDown network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\" successfully" Dec 13 01:56:03.207662 env[1208]: time="2024-12-13T01:56:03.207215334Z" level=info msg="StopPodSandbox for \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\" returns successfully" Dec 13 01:56:03.207834 env[1208]: time="2024-12-13T01:56:03.207798258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6987fb549c-zxdvf,Uid:b6a83261-02fc-4c35-a45c-8fe683d6b9a9,Namespace:calico-system,Attempt:1,}" Dec 13 01:56:03.209504 systemd[1]: run-netns-cni\x2de94fda19\x2d3b30\x2def82\x2d43e4\x2dc4fc164362e9.mount: Deactivated successfully. Dec 13 01:56:03.350951 kubelet[1959]: E1213 01:56:03.350919 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:03.370958 sshd[3930]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:03.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.101:22-10.0.0.1:58876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:03.375002 systemd[1]: Started sshd@12-10.0.0.101:22-10.0.0.1:58876.service. Dec 13 01:56:03.376000 audit[3930]: USER_END pid=3930 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.376000 audit[3930]: CRED_DISP pid=3930 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.101:22-10.0.0.1:58870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:03.380851 systemd[1]: sshd@11-10.0.0.101:22-10.0.0.1:58870.service: Deactivated successfully. Dec 13 01:56:03.381395 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 01:56:03.384037 systemd-logind[1195]: Session 12 logged out. Waiting for processes to exit. Dec 13 01:56:03.386345 systemd-logind[1195]: Removed session 12. Dec 13 01:56:03.424000 audit[3985]: USER_ACCT pid=3985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.426690 sshd[3985]: Accepted publickey for core from 10.0.0.1 port 58876 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:03.425000 audit[3985]: CRED_ACQ pid=3985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.426000 audit[3985]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd11ea2860 a2=3 a3=0 items=0 ppid=1 pid=3985 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.426000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:03.427809 sshd[3985]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:03.432530 systemd[1]: Started session-13.scope. Dec 13 01:56:03.433871 systemd-logind[1195]: New session 13 of user core. Dec 13 01:56:03.437000 audit[3985]: USER_START pid=3985 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.438000 audit[3996]: CRED_ACQ pid=3996 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.479447 systemd-networkd[1038]: cali8f858ea1f05: Gained IPv6LL Dec 13 01:56:03.580400 sshd[3985]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:03.580000 audit[3985]: USER_END pid=3985 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.582949 systemd-networkd[1038]: cali87d4d44e5f3: Link UP Dec 13 01:56:03.585089 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:56:03.585154 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali87d4d44e5f3: link becomes ready Dec 13 01:56:03.584000 audit[3985]: CRED_DISP pid=3985 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:03.585322 systemd-networkd[1038]: cali87d4d44e5f3: Gained carrier Dec 13 01:56:03.590000 systemd-logind[1195]: Session 13 logged out. Waiting for processes to exit. Dec 13 01:56:03.590380 systemd[1]: sshd@12-10.0.0.101:22-10.0.0.1:58876.service: Deactivated successfully. Dec 13 01:56:03.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.101:22-10.0.0.1:58876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:03.591016 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 01:56:03.594198 systemd-logind[1195]: Removed session 13. Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.415 [INFO][3972] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0 calico-kube-controllers-6987fb549c- calico-system b6a83261-02fc-4c35-a45c-8fe683d6b9a9 895 0 2024-12-13 01:55:33 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6987fb549c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6987fb549c-zxdvf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali87d4d44e5f3 [] []}} ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Namespace="calico-system" Pod="calico-kube-controllers-6987fb549c-zxdvf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.416 [INFO][3972] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Namespace="calico-system" Pod="calico-kube-controllers-6987fb549c-zxdvf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.448 [INFO][3990] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" HandleID="k8s-pod-network.4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.457 [INFO][3990] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" HandleID="k8s-pod-network.4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000363770), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6987fb549c-zxdvf", "timestamp":"2024-12-13 01:56:03.448510166 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.457 [INFO][3990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.457 [INFO][3990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.457 [INFO][3990] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.459 [INFO][3990] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" host="localhost" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.464 [INFO][3990] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.470 [INFO][3990] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.472 [INFO][3990] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.474 [INFO][3990] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.474 [INFO][3990] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" host="localhost" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.476 [INFO][3990] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0 Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.496 [INFO][3990] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" host="localhost" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.575 [INFO][3990] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" host="localhost" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.575 [INFO][3990] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" host="localhost" Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.575 [INFO][3990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:03.600359 env[1208]: 2024-12-13 01:56:03.576 [INFO][3990] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" HandleID="k8s-pod-network.4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.600928 env[1208]: 2024-12-13 01:56:03.581 [INFO][3972] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Namespace="calico-system" Pod="calico-kube-controllers-6987fb549c-zxdvf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0", GenerateName:"calico-kube-controllers-6987fb549c-", Namespace:"calico-system", SelfLink:"", UID:"b6a83261-02fc-4c35-a45c-8fe683d6b9a9", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6987fb549c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6987fb549c-zxdvf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali87d4d44e5f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:03.600928 env[1208]: 2024-12-13 01:56:03.581 [INFO][3972] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Namespace="calico-system" Pod="calico-kube-controllers-6987fb549c-zxdvf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.600928 env[1208]: 2024-12-13 01:56:03.581 [INFO][3972] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali87d4d44e5f3 ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Namespace="calico-system" Pod="calico-kube-controllers-6987fb549c-zxdvf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.600928 env[1208]: 2024-12-13 01:56:03.586 [INFO][3972] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Namespace="calico-system" Pod="calico-kube-controllers-6987fb549c-zxdvf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.600928 env[1208]: 2024-12-13 01:56:03.586 [INFO][3972] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Namespace="calico-system" Pod="calico-kube-controllers-6987fb549c-zxdvf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0", GenerateName:"calico-kube-controllers-6987fb549c-", Namespace:"calico-system", SelfLink:"", UID:"b6a83261-02fc-4c35-a45c-8fe683d6b9a9", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6987fb549c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0", Pod:"calico-kube-controllers-6987fb549c-zxdvf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali87d4d44e5f3", MAC:"b6:18:3c:90:7a:35", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:03.600928 env[1208]: 2024-12-13 01:56:03.596 [INFO][3972] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0" Namespace="calico-system" Pod="calico-kube-controllers-6987fb549c-zxdvf" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:03.610000 audit[4024]: NETFILTER_CFG table=filter:107 family=2 entries=52 op=nft_register_chain pid=4024 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:56:03.610000 audit[4024]: SYSCALL arch=c000003e syscall=46 success=yes exit=25056 a0=3 a1=7ffc1fbfeff0 a2=0 a3=7ffc1fbfefdc items=0 ppid=3451 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.610000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:56:03.842412 env[1208]: time="2024-12-13T01:56:03.842344169Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:56:03.842412 env[1208]: time="2024-12-13T01:56:03.842381789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:56:03.842656 env[1208]: time="2024-12-13T01:56:03.842393672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:56:03.842817 env[1208]: time="2024-12-13T01:56:03.842784545Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0 pid=4032 runtime=io.containerd.runc.v2 Dec 13 01:56:03.860027 systemd[1]: run-containerd-runc-k8s.io-4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0-runc.Tox0Ik.mount: Deactivated successfully. Dec 13 01:56:03.867890 systemd[1]: Started cri-containerd-4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0.scope. Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.876000 audit: BPF prog-id=178 op=LOAD Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4032 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323566366465656633373937616561633439646330343239376632 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4032 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323566366465656633373937616561633439646330343239376632 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit: BPF prog-id=179 op=LOAD Dec 13 01:56:03.877000 audit[4040]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000235130 items=0 ppid=4032 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323566366465656633373937616561633439646330343239376632 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit: BPF prog-id=180 op=LOAD Dec 13 01:56:03.877000 audit[4040]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000235178 items=0 ppid=4032 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323566366465656633373937616561633439646330343239376632 Dec 13 01:56:03.877000 audit: BPF prog-id=180 op=UNLOAD Dec 13 01:56:03.877000 audit: BPF prog-id=179 op=UNLOAD Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { perfmon } for pid=4040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit[4040]: AVC avc: denied { bpf } for pid=4040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.877000 audit: BPF prog-id=181 op=LOAD Dec 13 01:56:03.877000 audit[4040]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000235588 items=0 ppid=4032 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323566366465656633373937616561633439646330343239376632 Dec 13 01:56:03.879475 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:56:03.905523 env[1208]: time="2024-12-13T01:56:03.905468115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6987fb549c-zxdvf,Uid:b6a83261-02fc-4c35-a45c-8fe683d6b9a9,Namespace:calico-system,Attempt:1,} returns sandbox id \"4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0\"" Dec 13 01:56:03.926270 env[1208]: time="2024-12-13T01:56:03.926198065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:03.928536 env[1208]: time="2024-12-13T01:56:03.928471242Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:03.930372 env[1208]: time="2024-12-13T01:56:03.930315945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:03.931932 env[1208]: time="2024-12-13T01:56:03.931885521Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:03.932678 env[1208]: time="2024-12-13T01:56:03.932627184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 01:56:03.934559 env[1208]: time="2024-12-13T01:56:03.934526839Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 01:56:03.935401 env[1208]: time="2024-12-13T01:56:03.935365584Z" level=info msg="CreateContainer within sandbox \"2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 01:56:03.948391 env[1208]: time="2024-12-13T01:56:03.948344947Z" level=info msg="CreateContainer within sandbox \"2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"417e4e647930db56505d935a75386f5729b501bebb1f564a53df8b5997cb6821\"" Dec 13 01:56:03.948856 env[1208]: time="2024-12-13T01:56:03.948813055Z" level=info msg="StartContainer for \"417e4e647930db56505d935a75386f5729b501bebb1f564a53df8b5997cb6821\"" Dec 13 01:56:03.963564 systemd[1]: Started cri-containerd-417e4e647930db56505d935a75386f5729b501bebb1f564a53df8b5997cb6821.scope. Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.975000 audit: BPF prog-id=182 op=LOAD Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3418 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431376534653634373933306462353635303564393335613735333836 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3418 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431376534653634373933306462353635303564393335613735333836 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.976000 audit: BPF prog-id=183 op=LOAD Dec 13 01:56:03.976000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000325960 items=0 ppid=3418 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431376534653634373933306462353635303564393335613735333836 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit: BPF prog-id=184 op=LOAD Dec 13 01:56:03.980000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003259a8 items=0 ppid=3418 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431376534653634373933306462353635303564393335613735333836 Dec 13 01:56:03.980000 audit: BPF prog-id=184 op=UNLOAD Dec 13 01:56:03.980000 audit: BPF prog-id=183 op=UNLOAD Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:03.980000 audit: BPF prog-id=185 op=LOAD Dec 13 01:56:03.980000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325db8 items=0 ppid=3418 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:03.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431376534653634373933306462353635303564393335613735333836 Dec 13 01:56:04.115461 env[1208]: time="2024-12-13T01:56:04.115403002Z" level=info msg="StartContainer for \"417e4e647930db56505d935a75386f5729b501bebb1f564a53df8b5997cb6821\" returns successfully" Dec 13 01:56:04.119359 systemd-networkd[1038]: cali7a2be6c24ed: Gained IPv6LL Dec 13 01:56:04.355495 kubelet[1959]: E1213 01:56:04.355456 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:04.614000 audit[4105]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4105 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:04.614000 audit[4105]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffeb6edb050 a2=0 a3=7ffeb6edb03c items=0 ppid=2117 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:04.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:04.618000 audit[4105]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=4105 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:04.618000 audit[4105]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeb6edb050 a2=0 a3=7ffeb6edb03c items=0 ppid=2117 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:04.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:04.759368 systemd-networkd[1038]: cali87d4d44e5f3: Gained IPv6LL Dec 13 01:56:05.074000 audit[4084]: AVC avc: denied { watch } for pid=4084 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_55_48.373269062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c257,c725 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c257,c725 tclass=file permissive=0 Dec 13 01:56:05.074000 audit[4084]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000874ae0 a2=fc6 a3=0 items=0 ppid=3418 pid=4084 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c257,c725 key=(null) Dec 13 01:56:05.074000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:56:05.107062 env[1208]: time="2024-12-13T01:56:05.107007155Z" level=info msg="StopPodSandbox for \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\"" Dec 13 01:56:05.156566 kubelet[1959]: I1213 01:56:05.156492 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c6d7678b7-dgwgb" podStartSLOduration=29.208719461 podStartE2EDuration="32.156470631s" podCreationTimestamp="2024-12-13 01:55:33 +0000 UTC" firstStartedPulling="2024-12-13 01:56:00.985781192 +0000 UTC m=+43.962482991" lastFinishedPulling="2024-12-13 01:56:03.933532362 +0000 UTC m=+46.910234161" observedRunningTime="2024-12-13 01:56:04.532057015 +0000 UTC m=+47.508758814" watchObservedRunningTime="2024-12-13 01:56:05.156470631 +0000 UTC m=+48.133172430" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.155 [INFO][4122] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.156 [INFO][4122] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" iface="eth0" netns="/var/run/netns/cni-5a15313f-a56a-1b94-79e3-5b147319d126" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.156 [INFO][4122] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" iface="eth0" netns="/var/run/netns/cni-5a15313f-a56a-1b94-79e3-5b147319d126" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.156 [INFO][4122] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" iface="eth0" netns="/var/run/netns/cni-5a15313f-a56a-1b94-79e3-5b147319d126" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.156 [INFO][4122] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.156 [INFO][4122] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.175 [INFO][4129] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" HandleID="k8s-pod-network.75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.175 [INFO][4129] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.175 [INFO][4129] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.180 [WARNING][4129] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" HandleID="k8s-pod-network.75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.180 [INFO][4129] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" HandleID="k8s-pod-network.75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.182 [INFO][4129] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:05.185334 env[1208]: 2024-12-13 01:56:05.183 [INFO][4122] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:05.185923 env[1208]: time="2024-12-13T01:56:05.185505296Z" level=info msg="TearDown network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\" successfully" Dec 13 01:56:05.185923 env[1208]: time="2024-12-13T01:56:05.185540682Z" level=info msg="StopPodSandbox for \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\" returns successfully" Dec 13 01:56:05.185975 kubelet[1959]: E1213 01:56:05.185914 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:05.186381 env[1208]: time="2024-12-13T01:56:05.186353548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-n56mp,Uid:e211f842-4c36-4486-87f0-d3762df943dd,Namespace:kube-system,Attempt:1,}" Dec 13 01:56:05.187694 systemd[1]: run-netns-cni\x2d5a15313f\x2da56a\x2d1b94\x2d79e3\x2d5b147319d126.mount: Deactivated successfully. Dec 13 01:56:05.348906 systemd-networkd[1038]: calid62ce09aba8: Link UP Dec 13 01:56:05.356823 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:56:05.356891 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid62ce09aba8: link becomes ready Dec 13 01:56:05.357129 kubelet[1959]: I1213 01:56:05.357079 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:56:05.357162 systemd-networkd[1038]: calid62ce09aba8: Gained carrier Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.227 [INFO][4138] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--n56mp-eth0 coredns-6f6b679f8f- kube-system e211f842-4c36-4486-87f0-d3762df943dd 929 0 2024-12-13 01:55:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-n56mp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid62ce09aba8 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Namespace="kube-system" Pod="coredns-6f6b679f8f-n56mp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--n56mp-" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.227 [INFO][4138] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Namespace="kube-system" Pod="coredns-6f6b679f8f-n56mp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.255 [INFO][4149] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" HandleID="k8s-pod-network.ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.263 [INFO][4149] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" HandleID="k8s-pod-network.ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004dbeb0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-n56mp", "timestamp":"2024-12-13 01:56:05.255620123 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.263 [INFO][4149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.263 [INFO][4149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.263 [INFO][4149] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.265 [INFO][4149] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" host="localhost" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.272 [INFO][4149] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.276 [INFO][4149] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.277 [INFO][4149] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.279 [INFO][4149] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.279 [INFO][4149] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" host="localhost" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.281 [INFO][4149] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.293 [INFO][4149] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" host="localhost" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.334 [INFO][4149] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" host="localhost" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.334 [INFO][4149] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" host="localhost" Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.334 [INFO][4149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:05.511058 env[1208]: 2024-12-13 01:56:05.334 [INFO][4149] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" HandleID="k8s-pod-network.ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.511684 env[1208]: 2024-12-13 01:56:05.336 [INFO][4138] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Namespace="kube-system" Pod="coredns-6f6b679f8f-n56mp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--n56mp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e211f842-4c36-4486-87f0-d3762df943dd", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-n56mp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid62ce09aba8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:05.511684 env[1208]: 2024-12-13 01:56:05.337 [INFO][4138] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Namespace="kube-system" Pod="coredns-6f6b679f8f-n56mp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.511684 env[1208]: 2024-12-13 01:56:05.337 [INFO][4138] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid62ce09aba8 ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Namespace="kube-system" Pod="coredns-6f6b679f8f-n56mp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.511684 env[1208]: 2024-12-13 01:56:05.357 [INFO][4138] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Namespace="kube-system" Pod="coredns-6f6b679f8f-n56mp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.511684 env[1208]: 2024-12-13 01:56:05.357 [INFO][4138] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Namespace="kube-system" Pod="coredns-6f6b679f8f-n56mp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--n56mp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e211f842-4c36-4486-87f0-d3762df943dd", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d", Pod:"coredns-6f6b679f8f-n56mp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid62ce09aba8", MAC:"5a:23:a7:23:83:84", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:05.511684 env[1208]: 2024-12-13 01:56:05.509 [INFO][4138] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d" Namespace="kube-system" Pod="coredns-6f6b679f8f-n56mp" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:05.517000 audit[4172]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=4172 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:56:05.517000 audit[4172]: SYSCALL arch=c000003e syscall=46 success=yes exit=20580 a0=3 a1=7fff55f59780 a2=0 a3=7fff55f5976c items=0 ppid=3451 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:05.517000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:56:05.727947 env[1208]: time="2024-12-13T01:56:05.727795550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:56:05.727947 env[1208]: time="2024-12-13T01:56:05.727840885Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:56:05.727947 env[1208]: time="2024-12-13T01:56:05.727853629Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:56:05.728252 env[1208]: time="2024-12-13T01:56:05.728211321Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d pid=4180 runtime=io.containerd.runc.v2 Dec 13 01:56:05.745314 systemd[1]: Started cri-containerd-ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d.scope. Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit: BPF prog-id=186 op=LOAD Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4180 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:05.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563303133366533376531306263613935656337633865363065316165 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4180 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:05.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563303133366533376531306263613935656337633865363065316165 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.754000 audit: BPF prog-id=187 op=LOAD Dec 13 01:56:05.754000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dfa40 items=0 ppid=4180 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:05.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563303133366533376531306263613935656337633865363065316165 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit: BPF prog-id=188 op=LOAD Dec 13 01:56:05.755000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dfa88 items=0 ppid=4180 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:05.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563303133366533376531306263613935656337633865363065316165 Dec 13 01:56:05.755000 audit: BPF prog-id=188 op=UNLOAD Dec 13 01:56:05.755000 audit: BPF prog-id=187 op=UNLOAD Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:05.755000 audit: BPF prog-id=189 op=LOAD Dec 13 01:56:05.755000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001dfe98 items=0 ppid=4180 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:05.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563303133366533376531306263613935656337633865363065316165 Dec 13 01:56:05.756983 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 01:56:05.777402 env[1208]: time="2024-12-13T01:56:05.777226286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-n56mp,Uid:e211f842-4c36-4486-87f0-d3762df943dd,Namespace:kube-system,Attempt:1,} returns sandbox id \"ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d\"" Dec 13 01:56:05.777987 kubelet[1959]: E1213 01:56:05.777966 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:05.779800 env[1208]: time="2024-12-13T01:56:05.779768918Z" level=info msg="CreateContainer within sandbox \"ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 01:56:06.208465 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3985739435.mount: Deactivated successfully. Dec 13 01:56:06.399295 env[1208]: time="2024-12-13T01:56:06.399225416Z" level=info msg="CreateContainer within sandbox \"ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7664fa54fb49198a83ebe7a4e8df927e9f44fe6dae6b86edd93ca3e7c51147cf\"" Dec 13 01:56:06.400289 env[1208]: time="2024-12-13T01:56:06.400250250Z" level=info msg="StartContainer for \"7664fa54fb49198a83ebe7a4e8df927e9f44fe6dae6b86edd93ca3e7c51147cf\"" Dec 13 01:56:06.425044 systemd[1]: Started cri-containerd-7664fa54fb49198a83ebe7a4e8df927e9f44fe6dae6b86edd93ca3e7c51147cf.scope. Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.433000 audit: BPF prog-id=190 op=LOAD Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4180 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:06.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363466613534666234393139386138336562653761346538646639 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4180 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:06.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363466613534666234393139386138336562653761346538646639 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit: BPF prog-id=191 op=LOAD Dec 13 01:56:06.434000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000096a60 items=0 ppid=4180 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:06.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363466613534666234393139386138336562653761346538646639 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit: BPF prog-id=192 op=LOAD Dec 13 01:56:06.434000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000096aa8 items=0 ppid=4180 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:06.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363466613534666234393139386138336562653761346538646639 Dec 13 01:56:06.434000 audit: BPF prog-id=192 op=UNLOAD Dec 13 01:56:06.434000 audit: BPF prog-id=191 op=UNLOAD Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.434000 audit: BPF prog-id=193 op=LOAD Dec 13 01:56:06.434000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000096eb8 items=0 ppid=4180 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:06.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363466613534666234393139386138336562653761346538646639 Dec 13 01:56:06.448275 env[1208]: time="2024-12-13T01:56:06.448164014Z" level=info msg="StartContainer for \"7664fa54fb49198a83ebe7a4e8df927e9f44fe6dae6b86edd93ca3e7c51147cf\" returns successfully" Dec 13 01:56:06.489630 systemd-networkd[1038]: calid62ce09aba8: Gained IPv6LL Dec 13 01:56:06.633420 env[1208]: time="2024-12-13T01:56:06.633370321Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:06.635405 env[1208]: time="2024-12-13T01:56:06.635381536Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:06.637028 env[1208]: time="2024-12-13T01:56:06.636970397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:06.638788 env[1208]: time="2024-12-13T01:56:06.638756750Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:06.639193 env[1208]: time="2024-12-13T01:56:06.639149147Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 01:56:06.640173 env[1208]: time="2024-12-13T01:56:06.640142762Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 01:56:06.641280 env[1208]: time="2024-12-13T01:56:06.641241073Z" level=info msg="CreateContainer within sandbox \"3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 01:56:06.658315 env[1208]: time="2024-12-13T01:56:06.658248814Z" level=info msg="CreateContainer within sandbox \"3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"aa96394119c4ebb57972a80e04b412f23d29e62c52901e143060e8796d74cf89\"" Dec 13 01:56:06.658729 env[1208]: time="2024-12-13T01:56:06.658683248Z" level=info msg="StartContainer for \"aa96394119c4ebb57972a80e04b412f23d29e62c52901e143060e8796d74cf89\"" Dec 13 01:56:06.672531 systemd[1]: Started cri-containerd-aa96394119c4ebb57972a80e04b412f23d29e62c52901e143060e8796d74cf89.scope. Dec 13 01:56:06.684000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.684000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff6bd03fe18 items=0 ppid=3767 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:06.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393633393431313963346562623537393732613830653034623431 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit: BPF prog-id=194 op=LOAD Dec 13 01:56:06.685000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000099438 items=0 ppid=3767 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:06.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393633393431313963346562623537393732613830653034623431 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit: BPF prog-id=195 op=LOAD Dec 13 01:56:06.685000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000099488 items=0 ppid=3767 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:06.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393633393431313963346562623537393732613830653034623431 Dec 13 01:56:06.685000 audit: BPF prog-id=195 op=UNLOAD Dec 13 01:56:06.685000 audit: BPF prog-id=194 op=UNLOAD Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:06.685000 audit: BPF prog-id=196 op=LOAD Dec 13 01:56:06.685000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000099518 items=0 ppid=3767 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:06.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393633393431313963346562623537393732613830653034623431 Dec 13 01:56:06.698421 env[1208]: time="2024-12-13T01:56:06.698373821Z" level=info msg="StartContainer for \"aa96394119c4ebb57972a80e04b412f23d29e62c52901e143060e8796d74cf89\" returns successfully" Dec 13 01:56:06.991967 env[1208]: time="2024-12-13T01:56:06.991926172Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:06.993681 env[1208]: time="2024-12-13T01:56:06.993632945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:06.995040 env[1208]: time="2024-12-13T01:56:06.995004219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:06.996517 env[1208]: time="2024-12-13T01:56:06.996490469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:06.997032 env[1208]: time="2024-12-13T01:56:06.997009652Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 01:56:06.998029 env[1208]: time="2024-12-13T01:56:06.998011583Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 01:56:06.999171 env[1208]: time="2024-12-13T01:56:06.999127998Z" level=info msg="CreateContainer within sandbox \"3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 01:56:07.011574 env[1208]: time="2024-12-13T01:56:07.011536415Z" level=info msg="CreateContainer within sandbox \"3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"77d7c46fc571ade9950ce539ef6b6eecf2c456182723fa45bec07650e9fa758b\"" Dec 13 01:56:07.011926 env[1208]: time="2024-12-13T01:56:07.011908995Z" level=info msg="StartContainer for \"77d7c46fc571ade9950ce539ef6b6eecf2c456182723fa45bec07650e9fa758b\"" Dec 13 01:56:07.029228 systemd[1]: Started cri-containerd-77d7c46fc571ade9950ce539ef6b6eecf2c456182723fa45bec07650e9fa758b.scope. Dec 13 01:56:07.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit: BPF prog-id=197 op=LOAD Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3878 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:07.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643763343666633537316164653939353063653533396566366236 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3878 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:07.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643763343666633537316164653939353063653533396566366236 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit: BPF prog-id=198 op=LOAD Dec 13 01:56:07.041000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000283d80 items=0 ppid=3878 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:07.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643763343666633537316164653939353063653533396566366236 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit: BPF prog-id=199 op=LOAD Dec 13 01:56:07.041000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000283dc8 items=0 ppid=3878 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:07.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643763343666633537316164653939353063653533396566366236 Dec 13 01:56:07.041000 audit: BPF prog-id=199 op=UNLOAD Dec 13 01:56:07.041000 audit: BPF prog-id=198 op=UNLOAD Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:07.041000 audit: BPF prog-id=200 op=LOAD Dec 13 01:56:07.041000 audit[4305]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a61d8 items=0 ppid=3878 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:07.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643763343666633537316164653939353063653533396566366236 Dec 13 01:56:07.069376 env[1208]: time="2024-12-13T01:56:07.069325902Z" level=info msg="StartContainer for \"77d7c46fc571ade9950ce539ef6b6eecf2c456182723fa45bec07650e9fa758b\" returns successfully" Dec 13 01:56:07.364687 kubelet[1959]: E1213 01:56:07.364661 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:07.372404 kubelet[1959]: I1213 01:56:07.372297 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c6d7678b7-qxp2k" podStartSLOduration=29.724291996 podStartE2EDuration="34.372282733s" podCreationTimestamp="2024-12-13 01:55:33 +0000 UTC" firstStartedPulling="2024-12-13 01:56:02.349862238 +0000 UTC m=+45.326564037" lastFinishedPulling="2024-12-13 01:56:06.997852965 +0000 UTC m=+49.974554774" observedRunningTime="2024-12-13 01:56:07.371896017 +0000 UTC m=+50.348597806" watchObservedRunningTime="2024-12-13 01:56:07.372282733 +0000 UTC m=+50.348984532" Dec 13 01:56:07.383448 kubelet[1959]: I1213 01:56:07.383224 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-n56mp" podStartSLOduration=43.38317242 podStartE2EDuration="43.38317242s" podCreationTimestamp="2024-12-13 01:55:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:56:07.382878659 +0000 UTC m=+50.359580458" watchObservedRunningTime="2024-12-13 01:56:07.38317242 +0000 UTC m=+50.359874239" Dec 13 01:56:07.386000 audit[4336]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:07.386000 audit[4336]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe3c920ef0 a2=0 a3=7ffe3c920edc items=0 ppid=2117 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:07.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:07.392000 audit[4336]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:07.392000 audit[4336]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe3c920ef0 a2=0 a3=7ffe3c920edc items=0 ppid=2117 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:07.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:07.404000 audit[4338]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:07.404000 audit[4338]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff2ef39380 a2=0 a3=7fff2ef3936c items=0 ppid=2117 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:07.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:07.414000 audit[4338]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:07.414000 audit[4338]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff2ef39380 a2=0 a3=7fff2ef3936c items=0 ppid=2117 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:07.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:07.846480 systemd[1]: run-containerd-runc-k8s.io-77d7c46fc571ade9950ce539ef6b6eecf2c456182723fa45bec07650e9fa758b-runc.e6skbl.mount: Deactivated successfully. Dec 13 01:56:08.077209 kernel: kauditd_printk_skb: 378 callbacks suppressed Dec 13 01:56:08.077340 kernel: audit: type=1400 audit(1734054968.072:1367): avc: denied { watch } for pid=4315 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_55_48.642027238/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c354,c464 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c354,c464 tclass=file permissive=0 Dec 13 01:56:08.072000 audit[4315]: AVC avc: denied { watch } for pid=4315 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_55_48.642027238/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c354,c464 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c354,c464 tclass=file permissive=0 Dec 13 01:56:08.072000 audit[4315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000402d00 a2=fc6 a3=0 items=0 ppid=3878 pid=4315 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c354,c464 key=(null) Dec 13 01:56:08.088440 kernel: audit: type=1300 audit(1734054968.072:1367): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000402d00 a2=fc6 a3=0 items=0 ppid=3878 pid=4315 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c354,c464 key=(null) Dec 13 01:56:08.072000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:56:08.097518 kernel: audit: type=1327 audit(1734054968.072:1367): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:56:08.369230 kubelet[1959]: I1213 01:56:08.369174 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:56:08.369755 kubelet[1959]: E1213 01:56:08.369489 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:08.585974 systemd[1]: Started sshd@13-10.0.0.101:22-10.0.0.1:56738.service. Dec 13 01:56:08.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.101:22-10.0.0.1:56738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:08.593212 kernel: audit: type=1130 audit(1734054968.584:1368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.101:22-10.0.0.1:56738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:08.628000 audit[4341]: USER_ACCT pid=4341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:08.649021 sshd[4341]: Accepted publickey for core from 10.0.0.1 port 56738 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:08.649000 audit[4341]: CRED_ACQ pid=4341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:08.650767 sshd[4341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:08.655250 kernel: audit: type=1101 audit(1734054968.628:1369): pid=4341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:08.655301 kernel: audit: type=1103 audit(1734054968.649:1370): pid=4341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:08.655336 kernel: audit: type=1006 audit(1734054968.649:1371): pid=4341 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 01:56:08.654815 systemd[1]: Started session-14.scope. Dec 13 01:56:08.655460 systemd-logind[1195]: New session 14 of user core. Dec 13 01:56:08.656250 kernel: audit: type=1300 audit(1734054968.649:1371): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9455f8c0 a2=3 a3=0 items=0 ppid=1 pid=4341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:08.649000 audit[4341]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9455f8c0 a2=3 a3=0 items=0 ppid=1 pid=4341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:08.649000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:08.658000 audit[4341]: USER_START pid=4341 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:08.665896 kernel: audit: type=1327 audit(1734054968.649:1371): proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:08.665944 kernel: audit: type=1105 audit(1734054968.658:1372): pid=4341 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:08.659000 audit[4343]: CRED_ACQ pid=4343 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:08.850147 sshd[4341]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:08.850000 audit[4341]: USER_END pid=4341 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:08.850000 audit[4341]: CRED_DISP pid=4341 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:08.852769 systemd[1]: sshd@13-10.0.0.101:22-10.0.0.1:56738.service: Deactivated successfully. Dec 13 01:56:08.853477 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 01:56:08.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.101:22-10.0.0.1:56738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:08.853963 systemd-logind[1195]: Session 14 logged out. Waiting for processes to exit. Dec 13 01:56:08.854618 systemd-logind[1195]: Removed session 14. Dec 13 01:56:09.371091 kubelet[1959]: E1213 01:56:09.371045 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:09.992038 env[1208]: time="2024-12-13T01:56:09.991966827Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:10.113709 env[1208]: time="2024-12-13T01:56:10.113649606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:10.157761 env[1208]: time="2024-12-13T01:56:10.157703142Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:10.237197 env[1208]: time="2024-12-13T01:56:10.237133929Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:10.237785 env[1208]: time="2024-12-13T01:56:10.237739872Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 01:56:10.238650 env[1208]: time="2024-12-13T01:56:10.238629516Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 01:56:10.244781 env[1208]: time="2024-12-13T01:56:10.244513312Z" level=info msg="CreateContainer within sandbox \"4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 01:56:10.380040 env[1208]: time="2024-12-13T01:56:10.379988049Z" level=info msg="CreateContainer within sandbox \"4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"346372aa3d3ecbd7e0f7fa19c9e9c18326cb2c819839e222c59fa2a239d65fc5\"" Dec 13 01:56:10.380386 env[1208]: time="2024-12-13T01:56:10.380339559Z" level=info msg="StartContainer for \"346372aa3d3ecbd7e0f7fa19c9e9c18326cb2c819839e222c59fa2a239d65fc5\"" Dec 13 01:56:10.395014 systemd[1]: Started cri-containerd-346372aa3d3ecbd7e0f7fa19c9e9c18326cb2c819839e222c59fa2a239d65fc5.scope. Dec 13 01:56:10.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit: BPF prog-id=201 op=LOAD Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4032 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:10.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363337326161336433656362643765306637666131396339653963 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4032 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:10.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363337326161336433656362643765306637666131396339653963 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit: BPF prog-id=202 op=LOAD Dec 13 01:56:10.405000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002198e0 items=0 ppid=4032 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:10.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363337326161336433656362643765306637666131396339653963 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.405000 audit: BPF prog-id=203 op=LOAD Dec 13 01:56:10.405000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000219928 items=0 ppid=4032 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:10.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363337326161336433656362643765306637666131396339653963 Dec 13 01:56:10.406000 audit: BPF prog-id=203 op=UNLOAD Dec 13 01:56:10.406000 audit: BPF prog-id=202 op=UNLOAD Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:10.406000 audit: BPF prog-id=204 op=LOAD Dec 13 01:56:10.406000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000219d38 items=0 ppid=4032 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:10.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363337326161336433656362643765306637666131396339653963 Dec 13 01:56:10.432287 env[1208]: time="2024-12-13T01:56:10.432245345Z" level=info msg="StartContainer for \"346372aa3d3ecbd7e0f7fa19c9e9c18326cb2c819839e222c59fa2a239d65fc5\" returns successfully" Dec 13 01:56:11.421392 kubelet[1959]: I1213 01:56:11.421327 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6987fb549c-zxdvf" podStartSLOduration=32.089315492 podStartE2EDuration="38.421307411s" podCreationTimestamp="2024-12-13 01:55:33 +0000 UTC" firstStartedPulling="2024-12-13 01:56:03.906532112 +0000 UTC m=+46.883233911" lastFinishedPulling="2024-12-13 01:56:10.238524031 +0000 UTC m=+53.215225830" observedRunningTime="2024-12-13 01:56:11.386543076 +0000 UTC m=+54.363244875" watchObservedRunningTime="2024-12-13 01:56:11.421307411 +0000 UTC m=+54.398009210" Dec 13 01:56:11.964447 env[1208]: time="2024-12-13T01:56:11.964396284Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:11.966206 env[1208]: time="2024-12-13T01:56:11.966170667Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:11.967818 env[1208]: time="2024-12-13T01:56:11.967767096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:11.969214 env[1208]: time="2024-12-13T01:56:11.969174089Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:11.969681 env[1208]: time="2024-12-13T01:56:11.969643588Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 01:56:11.972087 env[1208]: time="2024-12-13T01:56:11.972054163Z" level=info msg="CreateContainer within sandbox \"3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 01:56:11.989234 env[1208]: time="2024-12-13T01:56:11.989172170Z" level=info msg="CreateContainer within sandbox \"3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"726902a9c6da09f3b13193d4d72b8ce587a3d38e593961df6ccb95405b9de220\"" Dec 13 01:56:11.989704 env[1208]: time="2024-12-13T01:56:11.989669872Z" level=info msg="StartContainer for \"726902a9c6da09f3b13193d4d72b8ce587a3d38e593961df6ccb95405b9de220\"" Dec 13 01:56:12.004367 systemd[1]: Started cri-containerd-726902a9c6da09f3b13193d4d72b8ce587a3d38e593961df6ccb95405b9de220.scope. Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3385b532c8 items=0 ppid=3767 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:12.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363930326139633664613039663362313331393364346437326238 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit: BPF prog-id=205 op=LOAD Dec 13 01:56:12.015000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=3767 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:12.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363930326139633664613039663362313331393364346437326238 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit: BPF prog-id=206 op=LOAD Dec 13 01:56:12.015000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=3767 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:12.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363930326139633664613039663362313331393364346437326238 Dec 13 01:56:12.015000 audit: BPF prog-id=206 op=UNLOAD Dec 13 01:56:12.015000 audit: BPF prog-id=205 op=UNLOAD Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:56:12.015000 audit: BPF prog-id=207 op=LOAD Dec 13 01:56:12.015000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=3767 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:12.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363930326139633664613039663362313331393364346437326238 Dec 13 01:56:12.191433 env[1208]: time="2024-12-13T01:56:12.191382099Z" level=info msg="StartContainer for \"726902a9c6da09f3b13193d4d72b8ce587a3d38e593961df6ccb95405b9de220\" returns successfully" Dec 13 01:56:12.230807 kubelet[1959]: I1213 01:56:12.230735 1959 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 01:56:12.230807 kubelet[1959]: I1213 01:56:12.230766 1959 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 01:56:12.393913 kubelet[1959]: I1213 01:56:12.393851 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-h6vvx" podStartSLOduration=29.342037061 podStartE2EDuration="39.393833426s" podCreationTimestamp="2024-12-13 01:55:33 +0000 UTC" firstStartedPulling="2024-12-13 01:56:01.918679514 +0000 UTC m=+44.895381303" lastFinishedPulling="2024-12-13 01:56:11.970475869 +0000 UTC m=+54.947177668" observedRunningTime="2024-12-13 01:56:12.393746589 +0000 UTC m=+55.370448378" watchObservedRunningTime="2024-12-13 01:56:12.393833426 +0000 UTC m=+55.370535226" Dec 13 01:56:13.854634 systemd[1]: Started sshd@14-10.0.0.101:22-10.0.0.1:56754.service. Dec 13 01:56:13.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.101:22-10.0.0.1:56754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:13.855732 kernel: kauditd_printk_skb: 104 callbacks suppressed Dec 13 01:56:13.855786 kernel: audit: type=1130 audit(1734054973.853:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.101:22-10.0.0.1:56754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:13.894000 audit[4464]: USER_ACCT pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:13.895637 sshd[4464]: Accepted publickey for core from 10.0.0.1 port 56754 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:13.898000 audit[4464]: CRED_ACQ pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:13.899949 sshd[4464]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:13.903159 kernel: audit: type=1101 audit(1734054973.894:1402): pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:13.903278 kernel: audit: type=1103 audit(1734054973.898:1403): pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:13.903302 kernel: audit: type=1006 audit(1734054973.898:1404): pid=4464 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 01:56:13.903624 systemd-logind[1195]: New session 15 of user core. Dec 13 01:56:13.904679 systemd[1]: Started session-15.scope. Dec 13 01:56:13.905575 kernel: audit: type=1300 audit(1734054973.898:1404): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf7137180 a2=3 a3=0 items=0 ppid=1 pid=4464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:13.898000 audit[4464]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf7137180 a2=3 a3=0 items=0 ppid=1 pid=4464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:13.898000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:13.910858 kernel: audit: type=1327 audit(1734054973.898:1404): proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:13.910923 kernel: audit: type=1105 audit(1734054973.908:1405): pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:13.908000 audit[4464]: USER_START pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:13.915109 kernel: audit: type=1103 audit(1734054973.909:1406): pid=4466 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:13.909000 audit[4466]: CRED_ACQ pid=4466 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:13.987000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:13.987000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017e8660 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:56:13.997407 kernel: audit: type=1400 audit(1734054973.987:1407): avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:13.997533 kernel: audit: type=1300 audit(1734054973.987:1407): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017e8660 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:56:13.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:56:13.987000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:13.987000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007c4840 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:56:13.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:56:14.049111 sshd[4464]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:14.048000 audit[4464]: USER_END pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:14.049000 audit[4464]: CRED_DISP pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:14.051807 systemd[1]: sshd@14-10.0.0.101:22-10.0.0.1:56754.service: Deactivated successfully. Dec 13 01:56:14.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.101:22-10.0.0.1:56754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:14.052551 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 01:56:14.053150 systemd-logind[1195]: Session 15 logged out. Waiting for processes to exit. Dec 13 01:56:14.054019 systemd-logind[1195]: Removed session 15. Dec 13 01:56:14.689000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:14.689000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:14.689000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:14.689000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00ce65170 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:56:14.689000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c7439e0 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:56:14.689000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00e776480 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:56:14.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:56:14.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:56:14.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:56:14.689000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:14.689000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00c743a10 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:56:14.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:56:14.689000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:14.689000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00b452960 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:56:14.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:56:14.692000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:14.692000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00e6e2600 a2=fc6 a3=0 items=0 ppid=1660 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c280 key=(null) Dec 13 01:56:14.692000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:56:17.092801 env[1208]: time="2024-12-13T01:56:17.092489824Z" level=info msg="StopPodSandbox for \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\"" Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.128 [WARNING][4493] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0", GenerateName:"calico-apiserver-5c6d7678b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab50393a-0d58-49f1-bac7-62189f4e3a9c", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c6d7678b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98", Pod:"calico-apiserver-5c6d7678b7-dgwgb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califdd0140b3ab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.129 [INFO][4493] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.129 [INFO][4493] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" iface="eth0" netns="" Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.129 [INFO][4493] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.129 [INFO][4493] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.152 [INFO][4502] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" HandleID="k8s-pod-network.ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.152 [INFO][4502] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.152 [INFO][4502] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.157 [WARNING][4502] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" HandleID="k8s-pod-network.ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.157 [INFO][4502] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" HandleID="k8s-pod-network.ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.159 [INFO][4502] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:17.162099 env[1208]: 2024-12-13 01:56:17.160 [INFO][4493] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:17.162873 env[1208]: time="2024-12-13T01:56:17.162139324Z" level=info msg="TearDown network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\" successfully" Dec 13 01:56:17.162873 env[1208]: time="2024-12-13T01:56:17.162213498Z" level=info msg="StopPodSandbox for \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\" returns successfully" Dec 13 01:56:17.162998 env[1208]: time="2024-12-13T01:56:17.162962731Z" level=info msg="RemovePodSandbox for \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\"" Dec 13 01:56:17.163056 env[1208]: time="2024-12-13T01:56:17.163013358Z" level=info msg="Forcibly stopping sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\"" Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.192 [WARNING][4525] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0", GenerateName:"calico-apiserver-5c6d7678b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab50393a-0d58-49f1-bac7-62189f4e3a9c", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c6d7678b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2fc3325080bd2c8855de152dc3b331f1f3004b17637a71943b4bbe71bfff6c98", Pod:"calico-apiserver-5c6d7678b7-dgwgb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califdd0140b3ab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.192 [INFO][4525] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.192 [INFO][4525] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" iface="eth0" netns="" Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.192 [INFO][4525] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.192 [INFO][4525] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.209 [INFO][4533] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" HandleID="k8s-pod-network.ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.209 [INFO][4533] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.209 [INFO][4533] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.214 [WARNING][4533] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" HandleID="k8s-pod-network.ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.214 [INFO][4533] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" HandleID="k8s-pod-network.ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--dgwgb-eth0" Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.216 [INFO][4533] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:17.218733 env[1208]: 2024-12-13 01:56:17.217 [INFO][4525] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b" Dec 13 01:56:17.219301 env[1208]: time="2024-12-13T01:56:17.218773988Z" level=info msg="TearDown network for sandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\" successfully" Dec 13 01:56:17.222332 env[1208]: time="2024-12-13T01:56:17.222298025Z" level=info msg="RemovePodSandbox \"ccff3abd9425fea345df520b7d9488c1e2fc32ddc9267148d8d7c0c1bf39b87b\" returns successfully" Dec 13 01:56:17.222768 env[1208]: time="2024-12-13T01:56:17.222745376Z" level=info msg="StopPodSandbox for \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\"" Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.253 [WARNING][4555] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--crrdj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd", Pod:"coredns-6f6b679f8f-crrdj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4575993a29f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.253 [INFO][4555] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.253 [INFO][4555] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" iface="eth0" netns="" Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.253 [INFO][4555] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.253 [INFO][4555] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.271 [INFO][4562] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" HandleID="k8s-pod-network.43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.271 [INFO][4562] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.271 [INFO][4562] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.279 [WARNING][4562] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" HandleID="k8s-pod-network.43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.279 [INFO][4562] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" HandleID="k8s-pod-network.43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.282 [INFO][4562] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:17.288339 env[1208]: 2024-12-13 01:56:17.285 [INFO][4555] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:17.288868 env[1208]: time="2024-12-13T01:56:17.288362610Z" level=info msg="TearDown network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\" successfully" Dec 13 01:56:17.288868 env[1208]: time="2024-12-13T01:56:17.288389181Z" level=info msg="StopPodSandbox for \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\" returns successfully" Dec 13 01:56:17.289017 env[1208]: time="2024-12-13T01:56:17.288970381Z" level=info msg="RemovePodSandbox for \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\"" Dec 13 01:56:17.289066 env[1208]: time="2024-12-13T01:56:17.289017091Z" level=info msg="Forcibly stopping sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\"" Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.324 [WARNING][4586] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--crrdj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"c10dc66a-6b7f-4bbf-9f8e-5d8c697f6800", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4e3d50b49037f02e5559914fc373dc23cff58b8174b6fe5deab2ed9b5c00e0fd", Pod:"coredns-6f6b679f8f-crrdj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4575993a29f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.324 [INFO][4586] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.324 [INFO][4586] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" iface="eth0" netns="" Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.324 [INFO][4586] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.324 [INFO][4586] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.342 [INFO][4598] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" HandleID="k8s-pod-network.43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.342 [INFO][4598] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.342 [INFO][4598] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.347 [WARNING][4598] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" HandleID="k8s-pod-network.43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.347 [INFO][4598] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" HandleID="k8s-pod-network.43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Workload="localhost-k8s-coredns--6f6b679f8f--crrdj-eth0" Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.349 [INFO][4598] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:17.352948 env[1208]: 2024-12-13 01:56:17.350 [INFO][4586] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c" Dec 13 01:56:17.352948 env[1208]: time="2024-12-13T01:56:17.351852907Z" level=info msg="TearDown network for sandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\" successfully" Dec 13 01:56:17.355147 env[1208]: time="2024-12-13T01:56:17.355121132Z" level=info msg="RemovePodSandbox \"43aaee01029521da9d0f1986966ba89a04620d6ee736c5ffa947e55a1a897d3c\" returns successfully" Dec 13 01:56:17.355742 env[1208]: time="2024-12-13T01:56:17.355718983Z" level=info msg="StopPodSandbox for \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\"" Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.386 [WARNING][4621] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0", GenerateName:"calico-apiserver-5c6d7678b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8b2255d-4e5d-45ed-9f32-2acef45e1687", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c6d7678b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced", Pod:"calico-apiserver-5c6d7678b7-qxp2k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7a2be6c24ed", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.387 [INFO][4621] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.387 [INFO][4621] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" iface="eth0" netns="" Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.387 [INFO][4621] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.387 [INFO][4621] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.409 [INFO][4628] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" HandleID="k8s-pod-network.0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.409 [INFO][4628] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.409 [INFO][4628] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.416 [WARNING][4628] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" HandleID="k8s-pod-network.0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.416 [INFO][4628] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" HandleID="k8s-pod-network.0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.418 [INFO][4628] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:17.421981 env[1208]: 2024-12-13 01:56:17.420 [INFO][4621] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:17.422573 env[1208]: time="2024-12-13T01:56:17.421986249Z" level=info msg="TearDown network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\" successfully" Dec 13 01:56:17.422573 env[1208]: time="2024-12-13T01:56:17.422021998Z" level=info msg="StopPodSandbox for \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\" returns successfully" Dec 13 01:56:17.422639 env[1208]: time="2024-12-13T01:56:17.422618988Z" level=info msg="RemovePodSandbox for \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\"" Dec 13 01:56:17.422692 env[1208]: time="2024-12-13T01:56:17.422649927Z" level=info msg="Forcibly stopping sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\"" Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.464 [WARNING][4652] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0", GenerateName:"calico-apiserver-5c6d7678b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8b2255d-4e5d-45ed-9f32-2acef45e1687", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c6d7678b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3eaf038497dac996310be3bdd6f0bfe3c7e8b73af06aa9b5b032e6c3fbcb9ced", Pod:"calico-apiserver-5c6d7678b7-qxp2k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7a2be6c24ed", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.464 [INFO][4652] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.464 [INFO][4652] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" iface="eth0" netns="" Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.464 [INFO][4652] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.464 [INFO][4652] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.483 [INFO][4659] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" HandleID="k8s-pod-network.0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.484 [INFO][4659] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.484 [INFO][4659] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.489 [WARNING][4659] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" HandleID="k8s-pod-network.0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.489 [INFO][4659] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" HandleID="k8s-pod-network.0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Workload="localhost-k8s-calico--apiserver--5c6d7678b7--qxp2k-eth0" Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.490 [INFO][4659] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:17.493640 env[1208]: 2024-12-13 01:56:17.492 [INFO][4652] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb" Dec 13 01:56:17.494076 env[1208]: time="2024-12-13T01:56:17.493661090Z" level=info msg="TearDown network for sandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\" successfully" Dec 13 01:56:17.553322 systemd[1]: run-containerd-runc-k8s.io-6e795c2db6ca1ef9c56bcc743e0f0ea4baa994156de090bd9153a0cc819277c8-runc.wxDdK6.mount: Deactivated successfully. Dec 13 01:56:17.594787 kubelet[1959]: E1213 01:56:17.594753 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:17.665232 env[1208]: time="2024-12-13T01:56:17.665108792Z" level=info msg="RemovePodSandbox \"0d35503bc0bd6977ec0a1e8f1e75f8c820fcc2a5b285f51cc5c32d02aea907bb\" returns successfully" Dec 13 01:56:17.665697 env[1208]: time="2024-12-13T01:56:17.665629014Z" level=info msg="StopPodSandbox for \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\"" Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:17.936 [WARNING][4702] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--n56mp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e211f842-4c36-4486-87f0-d3762df943dd", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d", Pod:"coredns-6f6b679f8f-n56mp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid62ce09aba8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:17.937 [INFO][4702] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:17.937 [INFO][4702] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" iface="eth0" netns="" Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:17.937 [INFO][4702] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:17.937 [INFO][4702] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:17.956 [INFO][4711] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" HandleID="k8s-pod-network.75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:17.956 [INFO][4711] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:17.956 [INFO][4711] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:18.019 [WARNING][4711] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" HandleID="k8s-pod-network.75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:18.019 [INFO][4711] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" HandleID="k8s-pod-network.75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:18.020 [INFO][4711] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:18.023630 env[1208]: 2024-12-13 01:56:18.022 [INFO][4702] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:18.023630 env[1208]: time="2024-12-13T01:56:18.023575653Z" level=info msg="TearDown network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\" successfully" Dec 13 01:56:18.023630 env[1208]: time="2024-12-13T01:56:18.023609950Z" level=info msg="StopPodSandbox for \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\" returns successfully" Dec 13 01:56:18.024607 env[1208]: time="2024-12-13T01:56:18.024551902Z" level=info msg="RemovePodSandbox for \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\"" Dec 13 01:56:18.024745 env[1208]: time="2024-12-13T01:56:18.024605987Z" level=info msg="Forcibly stopping sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\"" Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.054 [WARNING][4733] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--n56mp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e211f842-4c36-4486-87f0-d3762df943dd", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec0136e37e10bca95ec7c8e60e1aec4568c2298b2d8c95c9fa4c658407171e5d", Pod:"coredns-6f6b679f8f-n56mp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid62ce09aba8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.054 [INFO][4733] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.054 [INFO][4733] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" iface="eth0" netns="" Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.054 [INFO][4733] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.054 [INFO][4733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.072 [INFO][4740] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" HandleID="k8s-pod-network.75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.072 [INFO][4740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.072 [INFO][4740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.077 [WARNING][4740] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" HandleID="k8s-pod-network.75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.077 [INFO][4740] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" HandleID="k8s-pod-network.75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Workload="localhost-k8s-coredns--6f6b679f8f--n56mp-eth0" Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.078 [INFO][4740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:18.080879 env[1208]: 2024-12-13 01:56:18.079 [INFO][4733] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739" Dec 13 01:56:18.081449 env[1208]: time="2024-12-13T01:56:18.080939403Z" level=info msg="TearDown network for sandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\" successfully" Dec 13 01:56:18.084164 env[1208]: time="2024-12-13T01:56:18.084133620Z" level=info msg="RemovePodSandbox \"75372a65f71703fb340e2d62843ae56e7fb3a3ee8b49c2c2f5d455ac9e3cc739\" returns successfully" Dec 13 01:56:18.084637 env[1208]: time="2024-12-13T01:56:18.084604506Z" level=info msg="StopPodSandbox for \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\"" Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.112 [WARNING][4763] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--h6vvx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cf8f8d94-2bf0-4200-944d-c1dc194dbbca", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a", Pod:"csi-node-driver-h6vvx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8f858ea1f05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.113 [INFO][4763] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.113 [INFO][4763] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" iface="eth0" netns="" Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.113 [INFO][4763] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.113 [INFO][4763] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.130 [INFO][4770] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" HandleID="k8s-pod-network.f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.131 [INFO][4770] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.131 [INFO][4770] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.137 [WARNING][4770] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" HandleID="k8s-pod-network.f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.137 [INFO][4770] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" HandleID="k8s-pod-network.f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.138 [INFO][4770] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:18.141280 env[1208]: 2024-12-13 01:56:18.139 [INFO][4763] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:18.141871 env[1208]: time="2024-12-13T01:56:18.141313336Z" level=info msg="TearDown network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\" successfully" Dec 13 01:56:18.141871 env[1208]: time="2024-12-13T01:56:18.141351068Z" level=info msg="StopPodSandbox for \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\" returns successfully" Dec 13 01:56:18.141871 env[1208]: time="2024-12-13T01:56:18.141790464Z" level=info msg="RemovePodSandbox for \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\"" Dec 13 01:56:18.141871 env[1208]: time="2024-12-13T01:56:18.141814630Z" level=info msg="Forcibly stopping sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\"" Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.171 [WARNING][4794] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--h6vvx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cf8f8d94-2bf0-4200-944d-c1dc194dbbca", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3b8eab54139722828e3c638a31fe5a128b549001fb492142eb9cdc8eedf33c4a", Pod:"csi-node-driver-h6vvx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8f858ea1f05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.172 [INFO][4794] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.172 [INFO][4794] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" iface="eth0" netns="" Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.172 [INFO][4794] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.172 [INFO][4794] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.188 [INFO][4801] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" HandleID="k8s-pod-network.f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.188 [INFO][4801] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.188 [INFO][4801] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.194 [WARNING][4801] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" HandleID="k8s-pod-network.f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.194 [INFO][4801] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" HandleID="k8s-pod-network.f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Workload="localhost-k8s-csi--node--driver--h6vvx-eth0" Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.195 [INFO][4801] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:18.197901 env[1208]: 2024-12-13 01:56:18.196 [INFO][4794] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186" Dec 13 01:56:18.198395 env[1208]: time="2024-12-13T01:56:18.197967819Z" level=info msg="TearDown network for sandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\" successfully" Dec 13 01:56:18.201611 env[1208]: time="2024-12-13T01:56:18.201576456Z" level=info msg="RemovePodSandbox \"f6cf64555d2ff5e7a1ae37c19f092247899321d6c67bdfae0eb399c4eadbb186\" returns successfully" Dec 13 01:56:18.202045 env[1208]: time="2024-12-13T01:56:18.202017333Z" level=info msg="StopPodSandbox for \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\"" Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.230 [WARNING][4823] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0", GenerateName:"calico-kube-controllers-6987fb549c-", Namespace:"calico-system", SelfLink:"", UID:"b6a83261-02fc-4c35-a45c-8fe683d6b9a9", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6987fb549c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0", Pod:"calico-kube-controllers-6987fb549c-zxdvf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali87d4d44e5f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.230 [INFO][4823] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.230 [INFO][4823] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" iface="eth0" netns="" Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.230 [INFO][4823] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.230 [INFO][4823] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.249 [INFO][4831] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" HandleID="k8s-pod-network.f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.249 [INFO][4831] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.249 [INFO][4831] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.253 [WARNING][4831] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" HandleID="k8s-pod-network.f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.253 [INFO][4831] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" HandleID="k8s-pod-network.f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.255 [INFO][4831] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:18.257620 env[1208]: 2024-12-13 01:56:18.256 [INFO][4823] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:18.258175 env[1208]: time="2024-12-13T01:56:18.257626396Z" level=info msg="TearDown network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\" successfully" Dec 13 01:56:18.258175 env[1208]: time="2024-12-13T01:56:18.257655662Z" level=info msg="StopPodSandbox for \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\" returns successfully" Dec 13 01:56:18.258604 env[1208]: time="2024-12-13T01:56:18.258575342Z" level=info msg="RemovePodSandbox for \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\"" Dec 13 01:56:18.258669 env[1208]: time="2024-12-13T01:56:18.258613626Z" level=info msg="Forcibly stopping sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\"" Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.288 [WARNING][4853] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0", GenerateName:"calico-kube-controllers-6987fb549c-", Namespace:"calico-system", SelfLink:"", UID:"b6a83261-02fc-4c35-a45c-8fe683d6b9a9", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6987fb549c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4225f6deef3797aeac49dc04297f2a2cdfe149d434f297738fb75eccd4854db0", Pod:"calico-kube-controllers-6987fb549c-zxdvf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali87d4d44e5f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.288 [INFO][4853] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.288 [INFO][4853] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" iface="eth0" netns="" Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.288 [INFO][4853] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.288 [INFO][4853] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.306 [INFO][4860] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" HandleID="k8s-pod-network.f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.306 [INFO][4860] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.306 [INFO][4860] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.313 [WARNING][4860] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" HandleID="k8s-pod-network.f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.313 [INFO][4860] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" HandleID="k8s-pod-network.f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Workload="localhost-k8s-calico--kube--controllers--6987fb549c--zxdvf-eth0" Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.314 [INFO][4860] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:18.317589 env[1208]: 2024-12-13 01:56:18.316 [INFO][4853] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21" Dec 13 01:56:18.317589 env[1208]: time="2024-12-13T01:56:18.317541726Z" level=info msg="TearDown network for sandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\" successfully" Dec 13 01:56:18.322952 env[1208]: time="2024-12-13T01:56:18.322889769Z" level=info msg="RemovePodSandbox \"f825eee7de5917d2e9b32ad57a36b6bfc37c495379fbbca5c444319d91bc5c21\" returns successfully" Dec 13 01:56:18.622323 systemd[1]: run-containerd-runc-k8s.io-346372aa3d3ecbd7e0f7fa19c9e9c18326cb2c819839e222c59fa2a239d65fc5-runc.ySjGyS.mount: Deactivated successfully. Dec 13 01:56:19.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.101:22-10.0.0.1:55802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:19.054159 systemd[1]: Started sshd@15-10.0.0.101:22-10.0.0.1:55802.service. Dec 13 01:56:19.055744 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 01:56:19.055792 kernel: audit: type=1130 audit(1734054979.054:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.101:22-10.0.0.1:55802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:19.095000 audit[4887]: USER_ACCT pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.096252 sshd[4887]: Accepted publickey for core from 10.0.0.1 port 55802 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:19.097835 sshd[4887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:19.101483 systemd-logind[1195]: New session 16 of user core. Dec 13 01:56:19.101838 systemd[1]: Started session-16.scope. Dec 13 01:56:19.102492 kernel: audit: type=1101 audit(1734054979.095:1419): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.102532 kernel: audit: type=1103 audit(1734054979.097:1420): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.097000 audit[4887]: CRED_ACQ pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.110621 kernel: audit: type=1006 audit(1734054979.097:1421): pid=4887 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 01:56:19.110779 kernel: audit: type=1300 audit(1734054979.097:1421): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5badda20 a2=3 a3=0 items=0 ppid=1 pid=4887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:19.097000 audit[4887]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5badda20 a2=3 a3=0 items=0 ppid=1 pid=4887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:19.097000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:19.118029 kernel: audit: type=1327 audit(1734054979.097:1421): proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:19.118071 kernel: audit: type=1105 audit(1734054979.105:1422): pid=4887 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.105000 audit[4887]: USER_START pid=4887 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.123989 kernel: audit: type=1103 audit(1734054979.107:1423): pid=4889 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.107000 audit[4889]: CRED_ACQ pid=4889 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.237866 sshd[4887]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:19.238000 audit[4887]: USER_END pid=4887 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.240737 systemd[1]: sshd@15-10.0.0.101:22-10.0.0.1:55802.service: Deactivated successfully. Dec 13 01:56:19.241582 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 01:56:19.242505 systemd-logind[1195]: Session 16 logged out. Waiting for processes to exit. Dec 13 01:56:19.243478 systemd-logind[1195]: Removed session 16. Dec 13 01:56:19.238000 audit[4887]: CRED_DISP pid=4887 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.247805 kernel: audit: type=1106 audit(1734054979.238:1424): pid=4887 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.247857 kernel: audit: type=1104 audit(1734054979.238:1425): pid=4887 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:19.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.101:22-10.0.0.1:55802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:20.932000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:20.932000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000378960 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:56:20.932000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:56:20.932000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:20.932000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017e8880 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:56:20.932000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:56:20.935000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:20.935000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001555f40 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:56:20.935000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:56:20.935000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:56:20.935000 audit[1839]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017e88a0 a2=fc6 a3=0 items=0 ppid=1673 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c835 key=(null) Dec 13 01:56:20.935000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:56:24.242520 systemd[1]: Started sshd@16-10.0.0.101:22-10.0.0.1:55818.service. Dec 13 01:56:24.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.101:22-10.0.0.1:55818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:24.243491 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 01:56:24.243530 kernel: audit: type=1130 audit(1734054984.241:1431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.101:22-10.0.0.1:55818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:24.280000 audit[4906]: USER_ACCT pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.282438 sshd[4906]: Accepted publickey for core from 10.0.0.1 port 55818 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:24.283379 sshd[4906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:24.281000 audit[4906]: CRED_ACQ pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.287414 systemd-logind[1195]: New session 17 of user core. Dec 13 01:56:24.288244 systemd[1]: Started session-17.scope. Dec 13 01:56:24.290270 kernel: audit: type=1101 audit(1734054984.280:1432): pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.290408 kernel: audit: type=1103 audit(1734054984.281:1433): pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.290432 kernel: audit: type=1006 audit(1734054984.281:1434): pid=4906 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 01:56:24.281000 audit[4906]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe852d44c0 a2=3 a3=0 items=0 ppid=1 pid=4906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:24.296495 kernel: audit: type=1300 audit(1734054984.281:1434): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe852d44c0 a2=3 a3=0 items=0 ppid=1 pid=4906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:24.296531 kernel: audit: type=1327 audit(1734054984.281:1434): proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:24.281000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:24.291000 audit[4906]: USER_START pid=4906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.302096 kernel: audit: type=1105 audit(1734054984.291:1435): pid=4906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.302138 kernel: audit: type=1103 audit(1734054984.292:1436): pid=4908 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.292000 audit[4908]: CRED_ACQ pid=4908 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.388935 sshd[4906]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:24.388000 audit[4906]: USER_END pid=4906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.392097 systemd[1]: sshd@16-10.0.0.101:22-10.0.0.1:55818.service: Deactivated successfully. Dec 13 01:56:24.392611 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 01:56:24.395043 systemd[1]: Started sshd@17-10.0.0.101:22-10.0.0.1:55834.service. Dec 13 01:56:24.395857 systemd-logind[1195]: Session 17 logged out. Waiting for processes to exit. Dec 13 01:56:24.389000 audit[4906]: CRED_DISP pid=4906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.396821 systemd-logind[1195]: Removed session 17. Dec 13 01:56:24.400510 kernel: audit: type=1106 audit(1734054984.388:1437): pid=4906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.400607 kernel: audit: type=1104 audit(1734054984.389:1438): pid=4906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.101:22-10.0.0.1:55818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:24.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.101:22-10.0.0.1:55834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:24.431000 audit[4919]: USER_ACCT pid=4919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.432826 sshd[4919]: Accepted publickey for core from 10.0.0.1 port 55834 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:24.432000 audit[4919]: CRED_ACQ pid=4919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.432000 audit[4919]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe73b2d080 a2=3 a3=0 items=0 ppid=1 pid=4919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:24.432000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:24.434277 sshd[4919]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:24.437915 systemd-logind[1195]: New session 18 of user core. Dec 13 01:56:24.438766 systemd[1]: Started session-18.scope. Dec 13 01:56:24.441000 audit[4919]: USER_START pid=4919 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.443000 audit[4921]: CRED_ACQ pid=4921 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.770223 sshd[4919]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:24.770000 audit[4919]: USER_END pid=4919 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.770000 audit[4919]: CRED_DISP pid=4919 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.773173 systemd[1]: sshd@17-10.0.0.101:22-10.0.0.1:55834.service: Deactivated successfully. Dec 13 01:56:24.773819 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 01:56:24.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.101:22-10.0.0.1:55834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:24.774324 systemd-logind[1195]: Session 18 logged out. Waiting for processes to exit. Dec 13 01:56:24.775295 systemd[1]: Started sshd@18-10.0.0.101:22-10.0.0.1:55848.service. Dec 13 01:56:24.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.101:22-10.0.0.1:55848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:24.776120 systemd-logind[1195]: Removed session 18. Dec 13 01:56:24.813000 audit[4930]: USER_ACCT pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.814751 sshd[4930]: Accepted publickey for core from 10.0.0.1 port 55848 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:24.814000 audit[4930]: CRED_ACQ pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.814000 audit[4930]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc3703220 a2=3 a3=0 items=0 ppid=1 pid=4930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:24.814000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:24.815754 sshd[4930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:24.819143 systemd-logind[1195]: New session 19 of user core. Dec 13 01:56:24.819940 systemd[1]: Started session-19.scope. Dec 13 01:56:24.822000 audit[4930]: USER_START pid=4930 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:24.823000 audit[4932]: CRED_ACQ pid=4932 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.203000 audit[4949]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:26.203000 audit[4949]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdf388d690 a2=0 a3=7ffdf388d67c items=0 ppid=2117 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:26.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:26.210000 audit[4949]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:26.210000 audit[4949]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf388d690 a2=0 a3=7ffdf388d67c items=0 ppid=2117 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:26.210000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:26.214907 sshd[4930]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:26.214000 audit[4930]: USER_END pid=4930 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.215000 audit[4930]: CRED_DISP pid=4930 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.220024 systemd[1]: Started sshd@19-10.0.0.101:22-10.0.0.1:60586.service. Dec 13 01:56:26.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.101:22-10.0.0.1:60586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:26.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.101:22-10.0.0.1:55848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:26.220795 systemd[1]: sshd@18-10.0.0.101:22-10.0.0.1:55848.service: Deactivated successfully. Dec 13 01:56:26.221756 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 01:56:26.222514 systemd-logind[1195]: Session 19 logged out. Waiting for processes to exit. Dec 13 01:56:26.223000 audit[4954]: NETFILTER_CFG table=filter:117 family=2 entries=22 op=nft_register_rule pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:26.223000 audit[4954]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffc43017010 a2=0 a3=7ffc43016ffc items=0 ppid=2117 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:26.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:26.224897 systemd-logind[1195]: Removed session 19. Dec 13 01:56:26.229000 audit[4954]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:26.229000 audit[4954]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc43017010 a2=0 a3=0 items=0 ppid=2117 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:26.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:26.261000 audit[4952]: USER_ACCT pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.262989 sshd[4952]: Accepted publickey for core from 10.0.0.1 port 60586 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:26.262000 audit[4952]: CRED_ACQ pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.262000 audit[4952]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4fe905d0 a2=3 a3=0 items=0 ppid=1 pid=4952 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:26.262000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:26.263850 sshd[4952]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:26.267666 systemd-logind[1195]: New session 20 of user core. Dec 13 01:56:26.268403 systemd[1]: Started session-20.scope. Dec 13 01:56:26.272000 audit[4952]: USER_START pid=4952 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.273000 audit[4956]: CRED_ACQ pid=4956 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.580994 systemd[1]: run-containerd-runc-k8s.io-346372aa3d3ecbd7e0f7fa19c9e9c18326cb2c819839e222c59fa2a239d65fc5-runc.TxI301.mount: Deactivated successfully. Dec 13 01:56:26.609377 sshd[4952]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:26.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.101:22-10.0.0.1:60602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:26.612807 systemd[1]: Started sshd@20-10.0.0.101:22-10.0.0.1:60602.service. Dec 13 01:56:26.613000 audit[4952]: USER_END pid=4952 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.613000 audit[4952]: CRED_DISP pid=4952 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.101:22-10.0.0.1:60586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:26.615823 systemd[1]: sshd@19-10.0.0.101:22-10.0.0.1:60586.service: Deactivated successfully. Dec 13 01:56:26.616439 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 01:56:26.617699 systemd-logind[1195]: Session 20 logged out. Waiting for processes to exit. Dec 13 01:56:26.618546 systemd-logind[1195]: Removed session 20. Dec 13 01:56:26.655000 audit[4983]: USER_ACCT pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.656487 sshd[4983]: Accepted publickey for core from 10.0.0.1 port 60602 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:26.655000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.655000 audit[4983]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff25072b30 a2=3 a3=0 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:26.655000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:26.657378 sshd[4983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:26.660616 systemd-logind[1195]: New session 21 of user core. Dec 13 01:56:26.661642 systemd[1]: Started session-21.scope. Dec 13 01:56:26.664000 audit[4983]: USER_START pid=4983 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.665000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.769453 sshd[4983]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:26.769000 audit[4983]: USER_END pid=4983 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.769000 audit[4983]: CRED_DISP pid=4983 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:26.771378 systemd[1]: sshd@20-10.0.0.101:22-10.0.0.1:60602.service: Deactivated successfully. Dec 13 01:56:26.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.101:22-10.0.0.1:60602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:26.772025 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 01:56:26.772512 systemd-logind[1195]: Session 21 logged out. Waiting for processes to exit. Dec 13 01:56:26.773067 systemd-logind[1195]: Removed session 21. Dec 13 01:56:26.843087 kubelet[1959]: I1213 01:56:26.843043 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:56:27.244000 audit[4998]: NETFILTER_CFG table=filter:119 family=2 entries=33 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:27.244000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe81c675e0 a2=0 a3=7ffe81c675cc items=0 ppid=2117 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:27.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:27.253000 audit[4998]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:27.253000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe81c675e0 a2=0 a3=0 items=0 ppid=2117 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:27.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:31.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.101:22-10.0.0.1:60606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:31.774432 systemd[1]: Started sshd@21-10.0.0.101:22-10.0.0.1:60606.service. Dec 13 01:56:31.775797 kernel: kauditd_printk_skb: 63 callbacks suppressed Dec 13 01:56:31.775858 kernel: audit: type=1130 audit(1734054991.773:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.101:22-10.0.0.1:60606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:31.813000 audit[5003]: USER_ACCT pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.815298 sshd[5003]: Accepted publickey for core from 10.0.0.1 port 60606 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:31.816550 sshd[5003]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:31.814000 audit[5003]: CRED_ACQ pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.827518 kernel: audit: type=1101 audit(1734054991.813:1483): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.827697 kernel: audit: type=1103 audit(1734054991.814:1484): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.827726 kernel: audit: type=1006 audit(1734054991.815:1485): pid=5003 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 01:56:31.825981 systemd-logind[1195]: New session 22 of user core. Dec 13 01:56:31.826469 systemd[1]: Started session-22.scope. Dec 13 01:56:31.815000 audit[5003]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a850e90 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:31.815000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:31.835556 kernel: audit: type=1300 audit(1734054991.815:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a850e90 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:31.835632 kernel: audit: type=1327 audit(1734054991.815:1485): proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:31.835657 kernel: audit: type=1105 audit(1734054991.833:1486): pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.833000 audit[5003]: USER_START pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.834000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.844218 kernel: audit: type=1103 audit(1734054991.834:1487): pid=5005 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.950422 sshd[5003]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:31.950000 audit[5003]: USER_END pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.952713 systemd[1]: sshd@21-10.0.0.101:22-10.0.0.1:60606.service: Deactivated successfully. Dec 13 01:56:31.953453 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 01:56:31.954260 systemd-logind[1195]: Session 22 logged out. Waiting for processes to exit. Dec 13 01:56:31.955041 systemd-logind[1195]: Removed session 22. Dec 13 01:56:31.950000 audit[5003]: CRED_DISP pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.959524 kernel: audit: type=1106 audit(1734054991.950:1488): pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.959585 kernel: audit: type=1104 audit(1734054991.950:1489): pid=5003 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:31.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.101:22-10.0.0.1:60606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:32.492000 audit[5017]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:32.492000 audit[5017]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe73685ca0 a2=0 a3=7ffe73685c8c items=0 ppid=2117 pid=5017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:32.492000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:32.499000 audit[5017]: NETFILTER_CFG table=nat:122 family=2 entries=106 op=nft_register_chain pid=5017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:32.499000 audit[5017]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe73685ca0 a2=0 a3=7ffe73685c8c items=0 ppid=2117 pid=5017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:32.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:34.106957 kubelet[1959]: E1213 01:56:34.106903 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:36.106941 kubelet[1959]: E1213 01:56:36.106906 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 01:56:36.954613 systemd[1]: Started sshd@22-10.0.0.101:22-10.0.0.1:36446.service. Dec 13 01:56:36.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.101:22-10.0.0.1:36446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:36.955724 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 01:56:36.955783 kernel: audit: type=1130 audit(1734054996.953:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.101:22-10.0.0.1:36446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:36.991000 audit[5020]: USER_ACCT pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:36.992621 sshd[5020]: Accepted publickey for core from 10.0.0.1 port 36446 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:36.997682 sshd[5020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:37.001280 systemd-logind[1195]: New session 23 of user core. Dec 13 01:56:36.996000 audit[5020]: CRED_ACQ pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.001639 systemd[1]: Started session-23.scope. Dec 13 01:56:37.009727 kernel: audit: type=1101 audit(1734054996.991:1494): pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.009778 kernel: audit: type=1103 audit(1734054996.996:1495): pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.009803 kernel: audit: type=1006 audit(1734054996.996:1496): pid=5020 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 01:56:36.996000 audit[5020]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc953ab40 a2=3 a3=0 items=0 ppid=1 pid=5020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:37.016043 kernel: audit: type=1300 audit(1734054996.996:1496): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc953ab40 a2=3 a3=0 items=0 ppid=1 pid=5020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:37.016089 kernel: audit: type=1327 audit(1734054996.996:1496): proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:36.996000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:37.004000 audit[5020]: USER_START pid=5020 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.021566 kernel: audit: type=1105 audit(1734054997.004:1497): pid=5020 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.021609 kernel: audit: type=1103 audit(1734054997.005:1498): pid=5022 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.005000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.114496 sshd[5020]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:37.114000 audit[5020]: USER_END pid=5020 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.117347 systemd[1]: sshd@22-10.0.0.101:22-10.0.0.1:36446.service: Deactivated successfully. Dec 13 01:56:37.118047 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 01:56:37.118777 systemd-logind[1195]: Session 23 logged out. Waiting for processes to exit. Dec 13 01:56:37.119510 systemd-logind[1195]: Removed session 23. Dec 13 01:56:37.114000 audit[5020]: CRED_DISP pid=5020 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.123730 kernel: audit: type=1106 audit(1734054997.114:1499): pid=5020 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.123800 kernel: audit: type=1104 audit(1734054997.114:1500): pid=5020 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:37.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.101:22-10.0.0.1:36446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:42.119585 systemd[1]: Started sshd@23-10.0.0.101:22-10.0.0.1:36460.service. Dec 13 01:56:42.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.101:22-10.0.0.1:36460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:42.120807 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:56:42.120860 kernel: audit: type=1130 audit(1734055002.118:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.101:22-10.0.0.1:36460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:42.156000 audit[5039]: USER_ACCT pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.157854 sshd[5039]: Accepted publickey for core from 10.0.0.1 port 36460 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:42.159616 sshd[5039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:42.158000 audit[5039]: CRED_ACQ pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.163167 systemd-logind[1195]: New session 24 of user core. Dec 13 01:56:42.164028 systemd[1]: Started session-24.scope. Dec 13 01:56:42.165627 kernel: audit: type=1101 audit(1734055002.156:1503): pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.165674 kernel: audit: type=1103 audit(1734055002.158:1504): pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.165695 kernel: audit: type=1006 audit(1734055002.158:1505): pid=5039 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 01:56:42.158000 audit[5039]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5f74cdd0 a2=3 a3=0 items=0 ppid=1 pid=5039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:42.172155 kernel: audit: type=1300 audit(1734055002.158:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5f74cdd0 a2=3 a3=0 items=0 ppid=1 pid=5039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:42.172215 kernel: audit: type=1327 audit(1734055002.158:1505): proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:42.158000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:42.166000 audit[5039]: USER_START pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.177719 kernel: audit: type=1105 audit(1734055002.166:1506): pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.177768 kernel: audit: type=1103 audit(1734055002.168:1507): pid=5041 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.168000 audit[5041]: CRED_ACQ pid=5041 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.267143 sshd[5039]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:42.266000 audit[5039]: USER_END pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.269017 systemd[1]: sshd@23-10.0.0.101:22-10.0.0.1:36460.service: Deactivated successfully. Dec 13 01:56:42.269681 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 01:56:42.270818 systemd-logind[1195]: Session 24 logged out. Waiting for processes to exit. Dec 13 01:56:42.271586 systemd-logind[1195]: Removed session 24. Dec 13 01:56:42.266000 audit[5039]: CRED_DISP pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.275694 kernel: audit: type=1106 audit(1734055002.266:1508): pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.275747 kernel: audit: type=1104 audit(1734055002.266:1509): pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:42.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.101:22-10.0.0.1:36460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:42.642102 kubelet[1959]: I1213 01:56:42.642053 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:56:42.674000 audit[5052]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=5052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:42.674000 audit[5052]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffab198b60 a2=0 a3=7fffab198b4c items=0 ppid=2117 pid=5052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:42.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:42.680000 audit[5052]: NETFILTER_CFG table=nat:124 family=2 entries=58 op=nft_register_chain pid=5052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:56:42.680000 audit[5052]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7fffab198b60 a2=0 a3=7fffab198b4c items=0 ppid=2117 pid=5052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:42.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:56:47.271760 systemd[1]: Started sshd@24-10.0.0.101:22-10.0.0.1:52134.service. Dec 13 01:56:47.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.101:22-10.0.0.1:52134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:47.272915 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 01:56:47.272960 kernel: audit: type=1130 audit(1734055007.271:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.101:22-10.0.0.1:52134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:56:47.308000 audit[5056]: USER_ACCT pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.313000 audit[5056]: CRED_ACQ pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.318347 sshd[5056]: Accepted publickey for core from 10.0.0.1 port 52134 ssh2: RSA SHA256:AszxYrj4gj258y44bVsPwwDC94LR0fHfgjHsFkIPyiw Dec 13 01:56:47.318593 kernel: audit: type=1101 audit(1734055007.308:1514): pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.318641 kernel: audit: type=1103 audit(1734055007.313:1515): pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.318672 kernel: audit: type=1006 audit(1734055007.313:1516): pid=5056 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 01:56:47.314087 sshd[5056]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:56:47.313000 audit[5056]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe744eae40 a2=3 a3=0 items=0 ppid=1 pid=5056 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:47.326512 kernel: audit: type=1300 audit(1734055007.313:1516): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe744eae40 a2=3 a3=0 items=0 ppid=1 pid=5056 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:47.326578 kernel: audit: type=1327 audit(1734055007.313:1516): proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:47.313000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:56:47.330922 systemd-logind[1195]: New session 25 of user core. Dec 13 01:56:47.331975 systemd[1]: Started session-25.scope. Dec 13 01:56:47.337000 audit[5056]: USER_START pid=5056 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.343208 kernel: audit: type=1105 audit(1734055007.337:1517): pid=5056 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.343295 kernel: audit: type=1103 audit(1734055007.340:1518): pid=5058 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.340000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.457009 sshd[5056]: pam_unix(sshd:session): session closed for user core Dec 13 01:56:47.457000 audit[5056]: USER_END pid=5056 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.459010 systemd[1]: sshd@24-10.0.0.101:22-10.0.0.1:52134.service: Deactivated successfully. Dec 13 01:56:47.459736 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 01:56:47.457000 audit[5056]: CRED_DISP pid=5056 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.463865 systemd-logind[1195]: Session 25 logged out. Waiting for processes to exit. Dec 13 01:56:47.464709 systemd-logind[1195]: Removed session 25. Dec 13 01:56:47.466515 kernel: audit: type=1106 audit(1734055007.457:1519): pid=5056 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.466564 kernel: audit: type=1104 audit(1734055007.457:1520): pid=5056 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 01:56:47.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.101:22-10.0.0.1:52134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'