Dec 13 14:27:15.018920 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:27:15.018939 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:27:15.018949 kernel: BIOS-provided physical RAM map: Dec 13 14:27:15.018954 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:27:15.018959 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:27:15.018965 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:27:15.018971 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:27:15.018977 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:27:15.018982 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:27:15.018989 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:27:15.018994 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 14:27:15.018999 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:27:15.019005 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:27:15.019010 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:27:15.019017 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:27:15.019024 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:27:15.019030 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:27:15.019036 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:27:15.019041 kernel: NX (Execute Disable) protection: active Dec 13 14:27:15.019047 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:27:15.019053 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:27:15.019059 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:27:15.019065 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:27:15.019070 kernel: extended physical RAM map: Dec 13 14:27:15.019076 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:27:15.019083 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:27:15.019089 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:27:15.019095 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:27:15.019100 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:27:15.019106 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:27:15.019112 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:27:15.019118 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 14:27:15.019124 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 14:27:15.019129 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 14:27:15.019135 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 14:27:15.019141 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 14:27:15.019147 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:27:15.019153 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:27:15.019159 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:27:15.019165 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:27:15.019173 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:27:15.019180 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:27:15.019186 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:27:15.019193 kernel: efi: EFI v2.70 by EDK II Dec 13 14:27:15.019199 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 14:27:15.019206 kernel: random: crng init done Dec 13 14:27:15.019212 kernel: SMBIOS 2.8 present. Dec 13 14:27:15.019218 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 14:27:15.019224 kernel: Hypervisor detected: KVM Dec 13 14:27:15.019231 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:27:15.019237 kernel: kvm-clock: cpu 0, msr 5419a001, primary cpu clock Dec 13 14:27:15.019243 kernel: kvm-clock: using sched offset of 4317681468 cycles Dec 13 14:27:15.019251 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:27:15.019258 kernel: tsc: Detected 2794.748 MHz processor Dec 13 14:27:15.019264 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:27:15.019270 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:27:15.019277 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 14:27:15.019283 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:27:15.019290 kernel: Using GB pages for direct mapping Dec 13 14:27:15.019296 kernel: Secure boot disabled Dec 13 14:27:15.019303 kernel: ACPI: Early table checksum verification disabled Dec 13 14:27:15.019322 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 14:27:15.019329 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 14:27:15.019335 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:15.019342 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:15.019348 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 14:27:15.019354 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:15.019369 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:15.019376 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:15.019382 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:15.019390 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 14:27:15.019396 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 14:27:15.019402 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 14:27:15.019409 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 14:27:15.019415 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 14:27:15.019422 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 14:27:15.019428 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 14:27:15.019434 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 14:27:15.019441 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 14:27:15.019448 kernel: No NUMA configuration found Dec 13 14:27:15.019455 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 14:27:15.019461 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 14:27:15.019467 kernel: Zone ranges: Dec 13 14:27:15.019474 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:27:15.019480 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 14:27:15.019486 kernel: Normal empty Dec 13 14:27:15.019493 kernel: Movable zone start for each node Dec 13 14:27:15.019499 kernel: Early memory node ranges Dec 13 14:27:15.019507 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:27:15.019513 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 14:27:15.019519 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 14:27:15.019526 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 14:27:15.019532 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 14:27:15.019538 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 14:27:15.019544 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 14:27:15.019551 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:27:15.019557 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:27:15.019563 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 14:27:15.019571 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:27:15.019577 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 14:27:15.019584 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 14:27:15.019590 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 14:27:15.019597 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:27:15.019603 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:27:15.019609 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:27:15.019616 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:27:15.019622 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:27:15.019630 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:27:15.019636 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:27:15.019642 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:27:15.019649 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:27:15.019655 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:27:15.019662 kernel: TSC deadline timer available Dec 13 14:27:15.019671 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 14:27:15.019682 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 14:27:15.019694 kernel: kvm-guest: setup PV sched yield Dec 13 14:27:15.019703 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:27:15.019710 kernel: Booting paravirtualized kernel on KVM Dec 13 14:27:15.019731 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:27:15.019739 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 14:27:15.019746 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 14:27:15.019753 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 14:27:15.019762 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 14:27:15.019773 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 14:27:15.019780 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 14:27:15.019786 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:27:15.019793 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:27:15.019806 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 14:27:15.019821 kernel: Policy zone: DMA32 Dec 13 14:27:15.019835 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:27:15.019853 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:27:15.019866 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:27:15.019874 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:27:15.019881 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:27:15.019888 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 169308K reserved, 0K cma-reserved) Dec 13 14:27:15.019895 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 14:27:15.019902 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:27:15.019908 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:27:15.019915 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:27:15.019923 kernel: rcu: RCU event tracing is enabled. Dec 13 14:27:15.019930 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 14:27:15.019938 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:27:15.019945 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:27:15.019952 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:27:15.019958 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 14:27:15.019965 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 14:27:15.019975 kernel: Console: colour dummy device 80x25 Dec 13 14:27:15.019986 kernel: printk: console [ttyS0] enabled Dec 13 14:27:15.019999 kernel: ACPI: Core revision 20210730 Dec 13 14:27:15.020008 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 14:27:15.020019 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:27:15.020027 kernel: x2apic enabled Dec 13 14:27:15.020036 kernel: Switched APIC routing to physical x2apic. Dec 13 14:27:15.020045 kernel: kvm-guest: setup PV IPIs Dec 13 14:27:15.020054 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:27:15.020061 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:27:15.020068 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 14:27:15.020074 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 14:27:15.020081 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 14:27:15.020089 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 14:27:15.020097 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:27:15.020103 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:27:15.020110 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:27:15.020117 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:27:15.020124 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 14:27:15.020131 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 14:27:15.020138 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:27:15.020145 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:27:15.020157 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:27:15.020163 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:27:15.020170 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:27:15.020177 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:27:15.020184 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:27:15.020191 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:27:15.020197 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:27:15.020204 kernel: LSM: Security Framework initializing Dec 13 14:27:15.020211 kernel: SELinux: Initializing. Dec 13 14:27:15.020221 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:27:15.020228 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:27:15.020235 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 14:27:15.020242 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 14:27:15.020248 kernel: ... version: 0 Dec 13 14:27:15.020255 kernel: ... bit width: 48 Dec 13 14:27:15.020262 kernel: ... generic registers: 6 Dec 13 14:27:15.020268 kernel: ... value mask: 0000ffffffffffff Dec 13 14:27:15.020277 kernel: ... max period: 00007fffffffffff Dec 13 14:27:15.020285 kernel: ... fixed-purpose events: 0 Dec 13 14:27:15.020292 kernel: ... event mask: 000000000000003f Dec 13 14:27:15.020299 kernel: signal: max sigframe size: 1776 Dec 13 14:27:15.020316 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:27:15.020323 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:27:15.020330 kernel: x86: Booting SMP configuration: Dec 13 14:27:15.020336 kernel: .... node #0, CPUs: #1 Dec 13 14:27:15.020343 kernel: kvm-clock: cpu 1, msr 5419a041, secondary cpu clock Dec 13 14:27:15.020350 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 14:27:15.020358 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 14:27:15.020371 kernel: #2 Dec 13 14:27:15.020378 kernel: kvm-clock: cpu 2, msr 5419a081, secondary cpu clock Dec 13 14:27:15.020385 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 14:27:15.020391 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 14:27:15.020398 kernel: #3 Dec 13 14:27:15.020405 kernel: kvm-clock: cpu 3, msr 5419a0c1, secondary cpu clock Dec 13 14:27:15.020411 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 14:27:15.020418 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 14:27:15.020426 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 14:27:15.020433 kernel: smpboot: Max logical packages: 1 Dec 13 14:27:15.020439 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 14:27:15.020446 kernel: devtmpfs: initialized Dec 13 14:27:15.020453 kernel: x86/mm: Memory block size: 128MB Dec 13 14:27:15.020460 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 14:27:15.020467 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 14:27:15.020473 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 14:27:15.020480 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 14:27:15.020488 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 14:27:15.020495 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:27:15.020502 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 14:27:15.020508 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:27:15.020515 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:27:15.020522 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:27:15.020529 kernel: audit: type=2000 audit(1734100035.233:1): state=initialized audit_enabled=0 res=1 Dec 13 14:27:15.020535 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:27:15.020542 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:27:15.020550 kernel: cpuidle: using governor menu Dec 13 14:27:15.020556 kernel: ACPI: bus type PCI registered Dec 13 14:27:15.020563 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:27:15.020570 kernel: dca service started, version 1.12.1 Dec 13 14:27:15.020576 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 14:27:15.020583 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 14:27:15.020590 kernel: PCI: Using configuration type 1 for base access Dec 13 14:27:15.020597 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:27:15.020604 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:27:15.020612 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:27:15.020618 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:27:15.020625 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:27:15.020632 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:27:15.020638 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:27:15.020645 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:27:15.020652 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:27:15.020658 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:27:15.020665 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:27:15.020673 kernel: ACPI: Interpreter enabled Dec 13 14:27:15.020679 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:27:15.020686 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:27:15.020693 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:27:15.020700 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 14:27:15.020706 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:27:15.020823 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:27:15.020899 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 14:27:15.020968 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 14:27:15.020977 kernel: PCI host bridge to bus 0000:00 Dec 13 14:27:15.021048 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:27:15.021109 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:27:15.021169 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:27:15.021230 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 14:27:15.021299 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:27:15.021406 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 14:27:15.021470 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:27:15.021548 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 14:27:15.021624 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 14:27:15.021693 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 14:27:15.021764 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 14:27:15.021835 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 14:27:15.021907 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 14:27:15.021975 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:27:15.022051 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:27:15.022123 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 14:27:15.022192 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 14:27:15.022260 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 14:27:15.022353 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:27:15.022432 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 14:27:15.022564 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 14:27:15.022636 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 14:27:15.022712 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:27:15.022779 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 14:27:15.022847 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 14:27:15.022918 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 14:27:15.022987 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 14:27:15.023159 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 14:27:15.023237 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 14:27:15.023346 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 14:27:15.023431 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 14:27:15.023496 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 14:27:15.023573 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 14:27:15.023645 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 14:27:15.023654 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:27:15.023662 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:27:15.023669 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:27:15.023676 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:27:15.023682 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 14:27:15.023689 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 14:27:15.023698 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 14:27:15.023705 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 14:27:15.023712 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 14:27:15.023719 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 14:27:15.023725 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 14:27:15.023732 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 14:27:15.023739 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 14:27:15.023746 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 14:27:15.023752 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 14:27:15.023761 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 14:27:15.023768 kernel: iommu: Default domain type: Translated Dec 13 14:27:15.023775 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:27:15.023843 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 14:27:15.023910 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:27:15.023975 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 14:27:15.023985 kernel: vgaarb: loaded Dec 13 14:27:15.023992 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:27:15.024002 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Dec 13 14:27:15.024012 kernel: PTP clock support registered Dec 13 14:27:15.024020 kernel: Registered efivars operations Dec 13 14:27:15.024032 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:27:15.024042 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:27:15.024050 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 14:27:15.024058 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 14:27:15.024065 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 14:27:15.024071 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 14:27:15.024078 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 14:27:15.024087 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 14:27:15.024093 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 14:27:15.024100 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 14:27:15.024107 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:27:15.024114 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:27:15.024121 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:27:15.024128 kernel: pnp: PnP ACPI init Dec 13 14:27:15.024210 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 14:27:15.024223 kernel: pnp: PnP ACPI: found 6 devices Dec 13 14:27:15.024230 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:27:15.024237 kernel: NET: Registered PF_INET protocol family Dec 13 14:27:15.024244 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:27:15.024261 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:27:15.024274 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:27:15.024288 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:27:15.024295 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:27:15.024304 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:27:15.024322 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:27:15.024329 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:27:15.024338 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:27:15.024345 kernel: NET: Registered PF_XDP protocol family Dec 13 14:27:15.024429 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 14:27:15.024537 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 14:27:15.025093 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:27:15.025174 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:27:15.025244 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:27:15.025341 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 14:27:15.025411 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 14:27:15.025468 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 14:27:15.025477 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:27:15.025485 kernel: Initialise system trusted keyrings Dec 13 14:27:15.025504 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:27:15.025512 kernel: Key type asymmetric registered Dec 13 14:27:15.025521 kernel: Asymmetric key parser 'x509' registered Dec 13 14:27:15.025529 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:27:15.025545 kernel: io scheduler mq-deadline registered Dec 13 14:27:15.025554 kernel: io scheduler kyber registered Dec 13 14:27:15.025561 kernel: io scheduler bfq registered Dec 13 14:27:15.025568 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:27:15.025576 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 14:27:15.025583 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 14:27:15.025591 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 14:27:15.025604 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:27:15.025611 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:27:15.025619 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:27:15.025626 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:27:15.025634 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:27:15.025711 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:27:15.025721 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:27:15.025789 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:27:15.026026 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:27:14 UTC (1734100034) Dec 13 14:27:15.026094 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 14:27:15.026103 kernel: efifb: probing for efifb Dec 13 14:27:15.026111 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 14:27:15.026118 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 14:27:15.026125 kernel: efifb: scrolling: redraw Dec 13 14:27:15.026133 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:27:15.026140 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 14:27:15.026148 kernel: fb0: EFI VGA frame buffer device Dec 13 14:27:15.026158 kernel: pstore: Registered efi as persistent store backend Dec 13 14:27:15.026167 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:27:15.026174 kernel: Segment Routing with IPv6 Dec 13 14:27:15.026182 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:27:15.026190 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:27:15.026198 kernel: Key type dns_resolver registered Dec 13 14:27:15.026205 kernel: IPI shorthand broadcast: enabled Dec 13 14:27:15.026213 kernel: sched_clock: Marking stable (464120260, 132963966)->(655187370, -58103144) Dec 13 14:27:15.026220 kernel: registered taskstats version 1 Dec 13 14:27:15.026227 kernel: Loading compiled-in X.509 certificates Dec 13 14:27:15.026235 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:27:15.026242 kernel: Key type .fscrypt registered Dec 13 14:27:15.026249 kernel: Key type fscrypt-provisioning registered Dec 13 14:27:15.026257 kernel: pstore: Using crash dump compression: deflate Dec 13 14:27:15.026265 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:27:15.026272 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:27:15.026280 kernel: ima: No architecture policies found Dec 13 14:27:15.026287 kernel: clk: Disabling unused clocks Dec 13 14:27:15.026294 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:27:15.026301 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:27:15.026327 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:27:15.026334 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:27:15.026342 kernel: Run /init as init process Dec 13 14:27:15.026351 kernel: with arguments: Dec 13 14:27:15.026366 kernel: /init Dec 13 14:27:15.026374 kernel: with environment: Dec 13 14:27:15.026381 kernel: HOME=/ Dec 13 14:27:15.026388 kernel: TERM=linux Dec 13 14:27:15.026396 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:27:15.026405 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:27:15.026415 systemd[1]: Detected virtualization kvm. Dec 13 14:27:15.026424 systemd[1]: Detected architecture x86-64. Dec 13 14:27:15.026432 systemd[1]: Running in initrd. Dec 13 14:27:15.026439 systemd[1]: No hostname configured, using default hostname. Dec 13 14:27:15.026447 systemd[1]: Hostname set to <localhost>. Dec 13 14:27:15.026455 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:27:15.026463 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:27:15.026470 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:27:15.026478 systemd[1]: Reached target cryptsetup.target. Dec 13 14:27:15.026487 systemd[1]: Reached target paths.target. Dec 13 14:27:15.026494 systemd[1]: Reached target slices.target. Dec 13 14:27:15.026502 systemd[1]: Reached target swap.target. Dec 13 14:27:15.026510 systemd[1]: Reached target timers.target. Dec 13 14:27:15.026518 systemd[1]: Listening on iscsid.socket. Dec 13 14:27:15.026526 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:27:15.026533 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:27:15.026541 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:27:15.026554 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:27:15.026562 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:27:15.026569 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:27:15.026577 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:27:15.026585 systemd[1]: Reached target sockets.target. Dec 13 14:27:15.026592 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:27:15.026600 systemd[1]: Finished network-cleanup.service. Dec 13 14:27:15.026608 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:27:15.026615 systemd[1]: Starting systemd-journald.service... Dec 13 14:27:15.026624 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:27:15.026632 systemd[1]: Starting systemd-resolved.service... Dec 13 14:27:15.026639 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:27:15.026647 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:27:15.026662 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:27:15.026676 kernel: audit: type=1130 audit(1734100035.018:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.026690 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:27:15.026706 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:27:15.026727 systemd-journald[197]: Journal started Dec 13 14:27:15.026770 systemd-journald[197]: Runtime Journal (/run/log/journal/6bb1567819a84a2f89e58e90ab8334ac) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:27:15.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.025542 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 14:27:15.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.034330 kernel: audit: type=1130 audit(1734100035.030:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.034370 systemd[1]: Started systemd-journald.service. Dec 13 14:27:15.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.035980 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:27:15.044942 kernel: audit: type=1130 audit(1734100035.035:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.044970 kernel: audit: type=1130 audit(1734100035.038:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.040153 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:27:15.056140 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:27:15.063458 kernel: audit: type=1130 audit(1734100035.056:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.056353 systemd-resolved[199]: Positive Trust Anchors: Dec 13 14:27:15.067802 kernel: audit: type=1130 audit(1734100035.062:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.056369 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:27:15.056395 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:27:15.077061 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:27:15.058637 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 14:27:15.059488 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:27:15.062196 systemd[1]: Started systemd-resolved.service. Dec 13 14:27:15.063124 systemd[1]: Reached target nss-lookup.target. Dec 13 14:27:15.084589 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 14:27:15.085526 kernel: Bridge firewalling registered Dec 13 14:27:15.086640 dracut-cmdline[214]: dracut-dracut-053 Dec 13 14:27:15.089093 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:27:15.108344 kernel: SCSI subsystem initialized Dec 13 14:27:15.123739 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:27:15.123797 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:27:15.123808 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:27:15.129429 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 14:27:15.130296 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:27:15.132347 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:27:15.136884 kernel: audit: type=1130 audit(1734100035.130:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.143252 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:27:15.148432 kernel: audit: type=1130 audit(1734100035.143:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.151321 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:27:15.174351 kernel: iscsi: registered transport (tcp) Dec 13 14:27:15.196345 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:27:15.196413 kernel: QLogic iSCSI HBA Driver Dec 13 14:27:15.225546 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:27:15.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.226905 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:27:15.231703 kernel: audit: type=1130 audit(1734100035.225:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.273363 kernel: raid6: avx2x4 gen() 29753 MB/s Dec 13 14:27:15.290337 kernel: raid6: avx2x4 xor() 7267 MB/s Dec 13 14:27:15.307344 kernel: raid6: avx2x2 gen() 28113 MB/s Dec 13 14:27:15.324337 kernel: raid6: avx2x2 xor() 17412 MB/s Dec 13 14:27:15.341328 kernel: raid6: avx2x1 gen() 25081 MB/s Dec 13 14:27:15.358348 kernel: raid6: avx2x1 xor() 12549 MB/s Dec 13 14:27:15.375364 kernel: raid6: sse2x4 gen() 13967 MB/s Dec 13 14:27:15.392332 kernel: raid6: sse2x4 xor() 7308 MB/s Dec 13 14:27:15.409333 kernel: raid6: sse2x2 gen() 15723 MB/s Dec 13 14:27:15.426335 kernel: raid6: sse2x2 xor() 9087 MB/s Dec 13 14:27:15.443326 kernel: raid6: sse2x1 gen() 11808 MB/s Dec 13 14:27:15.461085 kernel: raid6: sse2x1 xor() 7102 MB/s Dec 13 14:27:15.461109 kernel: raid6: using algorithm avx2x4 gen() 29753 MB/s Dec 13 14:27:15.461119 kernel: raid6: .... xor() 7267 MB/s, rmw enabled Dec 13 14:27:15.462821 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:27:15.474332 kernel: xor: automatically using best checksumming function avx Dec 13 14:27:15.569364 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:27:15.577504 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:27:15.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.579000 audit: BPF prog-id=7 op=LOAD Dec 13 14:27:15.579000 audit: BPF prog-id=8 op=LOAD Dec 13 14:27:15.579948 systemd[1]: Starting systemd-udevd.service... Dec 13 14:27:15.598436 systemd-udevd[398]: Using default interface naming scheme 'v252'. Dec 13 14:27:15.605102 systemd[1]: Started systemd-udevd.service. Dec 13 14:27:15.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.606054 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:27:15.616940 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation Dec 13 14:27:15.641684 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:27:15.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.642869 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:27:15.676515 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:27:15.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:15.708420 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 14:27:15.723164 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:27:15.723185 kernel: libata version 3.00 loaded. Dec 13 14:27:15.723194 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:27:15.723203 kernel: GPT:9289727 != 19775487 Dec 13 14:27:15.723211 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:27:15.723220 kernel: GPT:9289727 != 19775487 Dec 13 14:27:15.723228 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:27:15.723236 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:15.726940 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:27:15.727003 kernel: AES CTR mode by8 optimization enabled Dec 13 14:27:15.732330 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 14:27:15.770082 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 14:27:15.770102 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 14:27:15.770222 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 14:27:15.770379 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (465) Dec 13 14:27:15.770395 kernel: scsi host0: ahci Dec 13 14:27:15.770515 kernel: scsi host1: ahci Dec 13 14:27:15.770635 kernel: scsi host2: ahci Dec 13 14:27:15.770752 kernel: scsi host3: ahci Dec 13 14:27:15.770880 kernel: scsi host4: ahci Dec 13 14:27:15.770997 kernel: scsi host5: ahci Dec 13 14:27:15.771128 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 14:27:15.771142 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 14:27:15.771154 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 14:27:15.771175 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 14:27:15.771187 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 14:27:15.771199 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 14:27:15.756931 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:27:15.760720 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:27:15.765547 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:27:15.777680 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:27:15.787678 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:27:15.790279 systemd[1]: Starting disk-uuid.service... Dec 13 14:27:15.797357 disk-uuid[538]: Primary Header is updated. Dec 13 14:27:15.797357 disk-uuid[538]: Secondary Entries is updated. Dec 13 14:27:15.797357 disk-uuid[538]: Secondary Header is updated. Dec 13 14:27:15.801472 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:15.804334 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:15.807329 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:16.080075 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:16.080145 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:16.080155 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 14:27:16.080164 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:16.080181 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:16.081353 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:16.082348 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 14:27:16.083503 kernel: ata3.00: applying bridge limits Dec 13 14:27:16.084330 kernel: ata3.00: configured for UDMA/100 Dec 13 14:27:16.086348 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 14:27:16.113344 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 14:27:16.129807 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:27:16.129820 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:27:16.815345 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:16.816026 disk-uuid[539]: The operation has completed successfully. Dec 13 14:27:16.836692 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:27:16.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:16.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:16.836793 systemd[1]: Finished disk-uuid.service. Dec 13 14:27:16.847771 systemd[1]: Starting verity-setup.service... Dec 13 14:27:16.871371 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 14:27:16.905141 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:27:16.906987 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:27:16.908902 systemd[1]: Finished verity-setup.service. Dec 13 14:27:16.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.016347 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:27:17.016722 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:27:17.018284 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:27:17.020073 systemd[1]: Starting ignition-setup.service... Dec 13 14:27:17.021216 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:27:17.033898 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:27:17.033955 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:27:17.033968 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:27:17.042067 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:27:17.050714 systemd[1]: Finished ignition-setup.service. Dec 13 14:27:17.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.052049 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:27:17.117214 ignition[660]: Ignition 2.14.0 Dec 13 14:27:17.117226 ignition[660]: Stage: fetch-offline Dec 13 14:27:17.117389 ignition[660]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:17.117402 ignition[660]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:17.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.119084 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:27:17.121000 audit: BPF prog-id=9 op=LOAD Dec 13 14:27:17.118097 ignition[660]: parsed url from cmdline: "" Dec 13 14:27:17.121930 systemd[1]: Starting systemd-networkd.service... Dec 13 14:27:17.118102 ignition[660]: no config URL provided Dec 13 14:27:17.118109 ignition[660]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:27:17.118118 ignition[660]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:27:17.118143 ignition[660]: op(1): [started] loading QEMU firmware config module Dec 13 14:27:17.118162 ignition[660]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 14:27:17.127406 ignition[660]: op(1): [finished] loading QEMU firmware config module Dec 13 14:27:17.143791 systemd-networkd[720]: lo: Link UP Dec 13 14:27:17.143799 systemd-networkd[720]: lo: Gained carrier Dec 13 14:27:17.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.144232 systemd-networkd[720]: Enumeration completed Dec 13 14:27:17.144432 systemd-networkd[720]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:27:17.144550 systemd[1]: Started systemd-networkd.service. Dec 13 14:27:17.145962 systemd[1]: Reached target network.target. Dec 13 14:27:17.147410 systemd-networkd[720]: eth0: Link UP Dec 13 14:27:17.147412 systemd-networkd[720]: eth0: Gained carrier Dec 13 14:27:17.148159 systemd[1]: Starting iscsiuio.service... Dec 13 14:27:17.175085 systemd[1]: Started iscsiuio.service. Dec 13 14:27:17.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.176826 systemd[1]: Starting iscsid.service... Dec 13 14:27:17.179433 ignition[660]: parsing config with SHA512: 02c3cf2d8c125c56f36d82d02a44672a33e60920a622f894bc723e6f7f5e37dac800fa298533a2f39e64ecdd9dcdb201d898a85f7406b6a24627ff732c681f4f Dec 13 14:27:17.181426 iscsid[725]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:27:17.181426 iscsid[725]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Dec 13 14:27:17.181426 iscsid[725]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:27:17.181426 iscsid[725]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:27:17.181426 iscsid[725]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:27:17.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.192020 ignition[660]: fetch-offline: fetch-offline passed Dec 13 14:27:17.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.197209 iscsid[725]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:27:17.188355 systemd[1]: Started iscsid.service. Dec 13 14:27:17.192069 ignition[660]: Ignition finished successfully Dec 13 14:27:17.190291 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:27:17.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.191631 unknown[660]: fetched base config from "system" Dec 13 14:27:17.191637 unknown[660]: fetched user config from "qemu" Dec 13 14:27:17.193447 systemd-networkd[720]: eth0: DHCPv4 address 10.0.0.115/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:27:17.195990 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:27:17.197189 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:27:17.197801 systemd[1]: Starting ignition-kargs.service... Dec 13 14:27:17.210928 ignition[733]: Ignition 2.14.0 Dec 13 14:27:17.202235 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:27:17.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.210934 ignition[733]: Stage: kargs Dec 13 14:27:17.204064 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:27:17.211031 ignition[733]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:17.205677 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:27:17.211041 ignition[733]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:17.207271 systemd[1]: Reached target remote-fs.target. Dec 13 14:27:17.212092 ignition[733]: kargs: kargs passed Dec 13 14:27:17.213020 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:27:17.212124 ignition[733]: Ignition finished successfully Dec 13 14:27:17.215228 systemd[1]: Finished ignition-kargs.service. Dec 13 14:27:17.222209 systemd[1]: Starting ignition-disks.service... Dec 13 14:27:17.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.226770 ignition[746]: Ignition 2.14.0 Dec 13 14:27:17.224594 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:27:17.226776 ignition[746]: Stage: disks Dec 13 14:27:17.226856 ignition[746]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:17.226864 ignition[746]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:17.227755 ignition[746]: disks: disks passed Dec 13 14:27:17.232141 systemd[1]: Finished ignition-disks.service. Dec 13 14:27:17.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.227793 ignition[746]: Ignition finished successfully Dec 13 14:27:17.233487 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:27:17.234005 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:27:17.236198 systemd[1]: Reached target local-fs.target. Dec 13 14:27:17.237783 systemd[1]: Reached target sysinit.target. Dec 13 14:27:17.238162 systemd[1]: Reached target basic.target. Dec 13 14:27:17.241833 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:27:17.254468 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.115 Dec 13 14:27:17.254481 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux3'. Dec 13 14:27:17.256608 systemd-fsck[754]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:27:17.265303 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:27:17.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.268990 systemd[1]: Mounting sysroot.mount... Dec 13 14:27:17.277454 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:27:17.277469 systemd[1]: Mounted sysroot.mount. Dec 13 14:27:17.278014 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:27:17.280998 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:27:17.281937 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:27:17.281970 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:27:17.281992 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:27:17.291738 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:27:17.293436 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:27:17.302591 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:27:17.307752 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:27:17.311136 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:27:17.315802 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:27:17.349651 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:27:17.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.351345 systemd[1]: Starting ignition-mount.service... Dec 13 14:27:17.352489 systemd[1]: Starting sysroot-boot.service... Dec 13 14:27:17.358291 bash[805]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:27:17.372480 systemd[1]: Finished sysroot-boot.service. Dec 13 14:27:17.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.374099 ignition[806]: INFO : Ignition 2.14.0 Dec 13 14:27:17.374099 ignition[806]: INFO : Stage: mount Dec 13 14:27:17.374099 ignition[806]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:17.374099 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:17.378045 ignition[806]: INFO : mount: mount passed Dec 13 14:27:17.378045 ignition[806]: INFO : Ignition finished successfully Dec 13 14:27:17.380359 systemd[1]: Finished ignition-mount.service. Dec 13 14:27:17.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.915873 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:27:17.927341 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (815) Dec 13 14:27:17.927384 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:27:17.929334 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:27:17.929361 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:27:17.933069 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:27:17.934933 systemd[1]: Starting ignition-files.service... Dec 13 14:27:17.960474 ignition[835]: INFO : Ignition 2.14.0 Dec 13 14:27:17.960474 ignition[835]: INFO : Stage: files Dec 13 14:27:17.962426 ignition[835]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:17.962426 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:17.962426 ignition[835]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:27:17.966422 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:27:17.966422 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:27:17.969433 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:27:17.971043 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:27:17.972584 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:27:17.972584 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:27:17.972584 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:27:17.971813 unknown[835]: wrote ssh authorized keys file for user: core Dec 13 14:27:18.033501 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:27:18.114388 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:27:18.116493 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:27:18.286582 systemd-networkd[720]: eth0: Gained IPv6LL Dec 13 14:27:18.498727 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 14:27:19.214703 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:27:19.214703 ignition[835]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:27:19.219957 ignition[835]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:27:19.268874 ignition[835]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:27:19.270743 ignition[835]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:27:19.270743 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:27:19.270743 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:27:19.270743 ignition[835]: INFO : files: files passed Dec 13 14:27:19.270743 ignition[835]: INFO : Ignition finished successfully Dec 13 14:27:19.289912 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:27:19.289969 kernel: audit: type=1130 audit(1734100039.272:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.289982 kernel: audit: type=1130 audit(1734100039.284:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.270737 systemd[1]: Finished ignition-files.service. Dec 13 14:27:19.297880 kernel: audit: type=1130 audit(1734100039.289:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.297907 kernel: audit: type=1131 audit(1734100039.289:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.274436 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:27:19.280344 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:27:19.302244 initrd-setup-root-after-ignition[858]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 14:27:19.281147 systemd[1]: Starting ignition-quench.service... Dec 13 14:27:19.304837 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:27:19.283262 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:27:19.285075 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:27:19.285145 systemd[1]: Finished ignition-quench.service. Dec 13 14:27:19.290112 systemd[1]: Reached target ignition-complete.target. Dec 13 14:27:19.298451 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:27:19.311549 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:27:19.311625 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:27:19.320795 kernel: audit: type=1130 audit(1734100039.313:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.320815 kernel: audit: type=1131 audit(1734100039.313:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.313562 systemd[1]: Reached target initrd-fs.target. Dec 13 14:27:19.320823 systemd[1]: Reached target initrd.target. Dec 13 14:27:19.321661 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:27:19.322497 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:27:19.331555 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:27:19.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.334016 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:27:19.338149 kernel: audit: type=1130 audit(1734100039.332:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.342795 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:27:19.344554 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:27:19.345575 systemd[1]: Stopped target timers.target. Dec 13 14:27:19.347135 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:27:19.353795 kernel: audit: type=1131 audit(1734100039.348:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.347254 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:27:19.348807 systemd[1]: Stopped target initrd.target. Dec 13 14:27:19.353861 systemd[1]: Stopped target basic.target. Dec 13 14:27:19.355600 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:27:19.357321 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:27:19.359077 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:27:19.361030 systemd[1]: Stopped target remote-fs.target. Dec 13 14:27:19.362806 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:27:19.364668 systemd[1]: Stopped target sysinit.target. Dec 13 14:27:19.366355 systemd[1]: Stopped target local-fs.target. Dec 13 14:27:19.368208 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:27:19.370095 systemd[1]: Stopped target swap.target. Dec 13 14:27:19.378008 kernel: audit: type=1131 audit(1734100039.373:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.371729 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:27:19.371841 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:27:19.384860 kernel: audit: type=1131 audit(1734100039.379:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.373639 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:27:19.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.378050 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:27:19.378139 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:27:19.380070 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:27:19.380169 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:27:19.385011 systemd[1]: Stopped target paths.target. Dec 13 14:27:19.386622 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:27:19.390373 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:27:19.391465 systemd[1]: Stopped target slices.target. Dec 13 14:27:19.392957 systemd[1]: Stopped target sockets.target. Dec 13 14:27:19.394810 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:27:19.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.394881 systemd[1]: Closed iscsid.socket. Dec 13 14:27:19.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.396387 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:27:19.396451 systemd[1]: Closed iscsiuio.socket. Dec 13 14:27:19.397900 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:27:19.397997 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:27:19.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.409642 ignition[875]: INFO : Ignition 2.14.0 Dec 13 14:27:19.409642 ignition[875]: INFO : Stage: umount Dec 13 14:27:19.409642 ignition[875]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:19.409642 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:19.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.399586 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:27:19.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.419473 ignition[875]: INFO : umount: umount passed Dec 13 14:27:19.419473 ignition[875]: INFO : Ignition finished successfully Dec 13 14:27:19.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.399670 systemd[1]: Stopped ignition-files.service. Dec 13 14:27:19.402302 systemd[1]: Stopping ignition-mount.service... Dec 13 14:27:19.404255 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:27:19.405109 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:27:19.405377 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:27:19.407529 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:27:19.407755 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:27:19.411639 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:27:19.411710 systemd[1]: Stopped ignition-mount.service. Dec 13 14:27:19.413882 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:27:19.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.413955 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:27:19.415671 systemd[1]: Stopped target network.target. Dec 13 14:27:19.417660 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:27:19.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.417699 systemd[1]: Stopped ignition-disks.service. Dec 13 14:27:19.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.419455 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:27:19.419487 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:27:19.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.421197 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:27:19.421232 systemd[1]: Stopped ignition-setup.service. Dec 13 14:27:19.423056 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:27:19.425659 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:27:19.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.428039 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:27:19.429369 systemd-networkd[720]: eth0: DHCPv6 lease lost Dec 13 14:27:19.431418 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:27:19.452000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:27:19.431511 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:27:19.456000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:27:19.435554 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:27:19.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.435593 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:27:19.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.438032 systemd[1]: Stopping network-cleanup.service... Dec 13 14:27:19.438895 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:27:19.438946 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:27:19.440947 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:27:19.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.440989 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:27:19.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.442997 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:27:19.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.443037 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:27:19.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.445424 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:27:19.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.448274 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:27:19.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.449288 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:27:19.449410 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:27:19.455448 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:27:19.455598 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:27:19.458565 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:27:19.458654 systemd[1]: Stopped network-cleanup.service. Dec 13 14:27:19.460126 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:27:19.460163 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:27:19.462010 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:27:19.462043 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:27:19.463899 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:27:19.463942 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:27:19.465836 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:27:19.465916 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:27:19.467656 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:27:19.467704 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:27:19.470244 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:27:19.471278 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:27:19.471341 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:27:19.472549 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:27:19.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.472595 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:27:19.474335 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:27:19.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.474378 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:27:19.476228 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:27:19.476702 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:27:19.476776 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:27:19.496151 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:27:19.496256 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:27:19.497697 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:27:19.499509 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:27:19.499556 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:27:19.502060 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:27:19.517674 systemd[1]: Switching root. Dec 13 14:27:19.537222 iscsid[725]: iscsid shutting down. Dec 13 14:27:19.538017 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Dec 13 14:27:19.538046 systemd-journald[197]: Journal stopped Dec 13 14:27:23.657912 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:27:23.657967 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:27:23.657979 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:27:23.657991 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:27:23.658003 kernel: SELinux: policy capability open_perms=1 Dec 13 14:27:23.658021 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:27:23.658031 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:27:23.658046 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:27:23.658061 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:27:23.658074 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:27:23.658086 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:27:23.658101 systemd[1]: Successfully loaded SELinux policy in 48.037ms. Dec 13 14:27:23.658128 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.385ms. Dec 13 14:27:23.658143 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:27:23.658174 systemd[1]: Detected virtualization kvm. Dec 13 14:27:23.658188 systemd[1]: Detected architecture x86-64. Dec 13 14:27:23.658203 systemd[1]: Detected first boot. Dec 13 14:27:23.658217 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:27:23.658229 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:27:23.658242 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:27:23.658257 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:27:23.658280 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:27:23.658292 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:27:23.658321 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:27:23.658336 systemd[1]: Stopped iscsiuio.service. Dec 13 14:27:23.658355 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:27:23.658371 systemd[1]: Stopped iscsid.service. Dec 13 14:27:23.658382 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:27:23.658395 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:27:23.658408 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:27:23.658422 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:27:23.658436 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:27:23.658448 systemd[1]: Created slice system-getty.slice. Dec 13 14:27:23.658461 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:27:23.658474 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:27:23.658496 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:27:23.658510 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:27:23.658524 systemd[1]: Created slice user.slice. Dec 13 14:27:23.658535 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:27:23.658545 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:27:23.658558 systemd[1]: Set up automount boot.automount. Dec 13 14:27:23.658568 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:27:23.658579 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:27:23.658595 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:27:23.658607 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:27:23.658620 systemd[1]: Reached target integritysetup.target. Dec 13 14:27:23.658634 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:27:23.658647 systemd[1]: Reached target remote-fs.target. Dec 13 14:27:23.658660 systemd[1]: Reached target slices.target. Dec 13 14:27:23.658670 systemd[1]: Reached target swap.target. Dec 13 14:27:23.658683 systemd[1]: Reached target torcx.target. Dec 13 14:27:23.658693 systemd[1]: Reached target veritysetup.target. Dec 13 14:27:23.658709 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:27:23.658719 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:27:23.658731 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:27:23.658744 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:27:23.658757 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:27:23.658772 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:27:23.658786 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:27:23.658799 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:27:23.658813 systemd[1]: Mounting media.mount... Dec 13 14:27:23.658827 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:23.658848 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:27:23.658863 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:27:23.658876 systemd[1]: Mounting tmp.mount... Dec 13 14:27:23.658891 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:27:23.658905 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:23.658918 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:27:23.658929 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:27:23.658942 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:23.658954 systemd[1]: Starting modprobe@drm.service... Dec 13 14:27:23.658972 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:23.658987 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:27:23.659001 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:23.659014 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:27:23.659028 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:27:23.659042 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:27:23.659057 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:27:23.659071 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:27:23.659091 kernel: loop: module loaded Dec 13 14:27:23.659105 systemd[1]: Stopped systemd-journald.service. Dec 13 14:27:23.659118 kernel: fuse: init (API version 7.34) Dec 13 14:27:23.659131 systemd[1]: Starting systemd-journald.service... Dec 13 14:27:23.659145 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:27:23.659159 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:27:23.659184 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:27:23.659199 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:27:23.659212 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:27:23.659224 systemd[1]: Stopped verity-setup.service. Dec 13 14:27:23.659243 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:23.659258 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:27:23.659273 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:27:23.659287 systemd[1]: Mounted media.mount. Dec 13 14:27:23.659325 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:27:23.659345 systemd-journald[986]: Journal started Dec 13 14:27:23.659395 systemd-journald[986]: Runtime Journal (/run/log/journal/6bb1567819a84a2f89e58e90ab8334ac) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:27:19.607000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:27:19.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:27:19.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:27:19.916000 audit: BPF prog-id=10 op=LOAD Dec 13 14:27:19.916000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:27:19.916000 audit: BPF prog-id=11 op=LOAD Dec 13 14:27:19.916000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:27:19.983000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:27:19.983000 audit[909]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:19.983000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:27:19.985000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:27:19.985000 audit[909]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079b9 a2=1ed a3=0 items=2 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:19.985000 audit: CWD cwd="/" Dec 13 14:27:19.985000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:19.985000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:19.985000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:27:23.504000 audit: BPF prog-id=12 op=LOAD Dec 13 14:27:23.504000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:27:23.504000 audit: BPF prog-id=13 op=LOAD Dec 13 14:27:23.504000 audit: BPF prog-id=14 op=LOAD Dec 13 14:27:23.504000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:27:23.504000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:27:23.506000 audit: BPF prog-id=15 op=LOAD Dec 13 14:27:23.506000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:27:23.506000 audit: BPF prog-id=16 op=LOAD Dec 13 14:27:23.506000 audit: BPF prog-id=17 op=LOAD Dec 13 14:27:23.506000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:27:23.506000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:27:23.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.520000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:27:23.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.631000 audit: BPF prog-id=18 op=LOAD Dec 13 14:27:23.631000 audit: BPF prog-id=19 op=LOAD Dec 13 14:27:23.632000 audit: BPF prog-id=20 op=LOAD Dec 13 14:27:23.632000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:27:23.632000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:27:23.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.655000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:27:23.655000 audit[986]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffc9a0d22f0 a2=4000 a3=7ffc9a0d238c items=0 ppid=1 pid=986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:23.655000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:27:23.502791 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:27:19.982644 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:27:23.502806 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:27:19.982854 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:27:23.508289 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:27:19.982870 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:27:23.661468 systemd[1]: Started systemd-journald.service. Dec 13 14:27:19.982896 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:27:23.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.982905 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:27:19.982931 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:27:23.661748 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:27:19.982942 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:27:19.983127 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:27:19.983157 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:27:19.983168 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:27:19.983527 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:27:19.983557 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:27:19.983578 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:27:19.983590 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:27:19.983604 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:27:19.983616 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:27:23.174044 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:23Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:27:23.174380 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:23Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:27:23.174538 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:23Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:27:23.174726 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:23Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:27:23.662907 systemd[1]: Mounted tmp.mount. Dec 13 14:27:23.174781 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:23Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:27:23.174862 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:27:23Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:27:23.663941 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:27:23.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.665025 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:27:23.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.666073 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:27:23.666206 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:27:23.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.667290 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:23.667409 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:23.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.668534 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:27:23.668663 systemd[1]: Finished modprobe@drm.service. Dec 13 14:27:23.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.669753 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:23.669876 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:23.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.670988 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:27:23.671112 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:27:23.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.672129 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:23.672257 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:23.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.673349 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:27:23.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.674685 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:27:23.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.676023 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:27:23.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.677345 systemd[1]: Reached target network-pre.target. Dec 13 14:27:23.679296 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:27:23.681084 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:27:23.681868 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:27:23.683982 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:27:23.685846 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:27:23.686816 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:27:23.688055 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:27:23.688919 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:27:23.690049 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:27:23.692879 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:27:23.694304 systemd-journald[986]: Time spent on flushing to /var/log/journal/6bb1567819a84a2f89e58e90ab8334ac is 22.538ms for 1167 entries. Dec 13 14:27:23.694304 systemd-journald[986]: System Journal (/var/log/journal/6bb1567819a84a2f89e58e90ab8334ac) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:27:23.733582 systemd-journald[986]: Received client request to flush runtime journal. Dec 13 14:27:23.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.697264 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:27:23.734694 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:27:23.698449 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:27:23.700603 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:27:23.702769 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:27:23.705215 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:27:23.706381 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:27:23.713849 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:27:23.716778 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:27:23.720578 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:27:23.734535 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:27:23.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:23.737889 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:27:23.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.478984 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:27:24.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.480906 kernel: kauditd_printk_skb: 101 callbacks suppressed Dec 13 14:27:24.480974 kernel: audit: type=1130 audit(1734100044.479:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.483000 audit: BPF prog-id=21 op=LOAD Dec 13 14:27:24.485078 kernel: audit: type=1334 audit(1734100044.483:138): prog-id=21 op=LOAD Dec 13 14:27:24.485130 kernel: audit: type=1334 audit(1734100044.484:139): prog-id=22 op=LOAD Dec 13 14:27:24.484000 audit: BPF prog-id=22 op=LOAD Dec 13 14:27:24.485910 systemd[1]: Starting systemd-udevd.service... Dec 13 14:27:24.484000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:27:24.484000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:27:24.486335 kernel: audit: type=1334 audit(1734100044.484:140): prog-id=7 op=UNLOAD Dec 13 14:27:24.486373 kernel: audit: type=1334 audit(1734100044.484:141): prog-id=8 op=UNLOAD Dec 13 14:27:24.503261 systemd-udevd[1018]: Using default interface naming scheme 'v252'. Dec 13 14:27:24.518572 systemd[1]: Started systemd-udevd.service. Dec 13 14:27:24.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.522000 audit: BPF prog-id=23 op=LOAD Dec 13 14:27:24.524827 kernel: audit: type=1130 audit(1734100044.519:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.524886 kernel: audit: type=1334 audit(1734100044.522:143): prog-id=23 op=LOAD Dec 13 14:27:24.525348 systemd[1]: Starting systemd-networkd.service... Dec 13 14:27:24.532127 kernel: audit: type=1334 audit(1734100044.529:144): prog-id=24 op=LOAD Dec 13 14:27:24.533473 kernel: audit: type=1334 audit(1734100044.530:145): prog-id=25 op=LOAD Dec 13 14:27:24.533527 kernel: audit: type=1334 audit(1734100044.531:146): prog-id=26 op=LOAD Dec 13 14:27:24.529000 audit: BPF prog-id=24 op=LOAD Dec 13 14:27:24.530000 audit: BPF prog-id=25 op=LOAD Dec 13 14:27:24.531000 audit: BPF prog-id=26 op=LOAD Dec 13 14:27:24.532789 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:27:24.551766 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:27:24.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.559931 systemd[1]: Started systemd-userdbd.service. Dec 13 14:27:24.601350 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:27:24.604551 systemd-networkd[1029]: lo: Link UP Dec 13 14:27:24.604564 systemd-networkd[1029]: lo: Gained carrier Dec 13 14:27:24.605022 systemd-networkd[1029]: Enumeration completed Dec 13 14:27:24.605169 systemd[1]: Started systemd-networkd.service. Dec 13 14:27:24.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.605743 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:27:24.607365 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:27:24.607789 systemd-networkd[1029]: eth0: Link UP Dec 13 14:27:24.607801 systemd-networkd[1029]: eth0: Gained carrier Dec 13 14:27:24.619098 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:27:24.621471 systemd-networkd[1029]: eth0: DHCPv4 address 10.0.0.115/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:27:24.628000 audit[1023]: AVC avc: denied { confidentiality } for pid=1023 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:27:24.628000 audit[1023]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55eda58684d0 a1=337fc a2=7fe39731bbc5 a3=5 items=110 ppid=1018 pid=1023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:24.628000 audit: CWD cwd="/" Dec 13 14:27:24.628000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=1 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=2 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=3 name=(null) inode=12063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=4 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=5 name=(null) inode=12064 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=6 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=7 name=(null) inode=12065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=8 name=(null) inode=12065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=9 name=(null) inode=12066 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=10 name=(null) inode=12065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=11 name=(null) inode=12067 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=12 name=(null) inode=12065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=13 name=(null) inode=12068 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=14 name=(null) inode=12065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=15 name=(null) inode=12069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=16 name=(null) inode=12065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=17 name=(null) inode=12070 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=18 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=19 name=(null) inode=12071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=20 name=(null) inode=12071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=21 name=(null) inode=12072 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=22 name=(null) inode=12071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=23 name=(null) inode=12073 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=24 name=(null) inode=12071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=25 name=(null) inode=12074 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=26 name=(null) inode=12071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=27 name=(null) inode=12075 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=28 name=(null) inode=12071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=29 name=(null) inode=12076 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=30 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=31 name=(null) inode=12077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=32 name=(null) inode=12077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=33 name=(null) inode=12078 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=34 name=(null) inode=12077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=35 name=(null) inode=12079 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=36 name=(null) inode=12077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=37 name=(null) inode=12080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=38 name=(null) inode=12077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=39 name=(null) inode=12081 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=40 name=(null) inode=12077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=41 name=(null) inode=12082 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=42 name=(null) inode=12062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=43 name=(null) inode=12083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=44 name=(null) inode=12083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=45 name=(null) inode=12084 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=46 name=(null) inode=12083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=47 name=(null) inode=12085 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=48 name=(null) inode=12083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=49 name=(null) inode=12086 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=50 name=(null) inode=12083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=51 name=(null) inode=12087 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=52 name=(null) inode=12083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=53 name=(null) inode=12088 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=55 name=(null) inode=12089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=56 name=(null) inode=12089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=57 name=(null) inode=12090 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=58 name=(null) inode=12089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=59 name=(null) inode=12091 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=60 name=(null) inode=12089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=61 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=62 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=63 name=(null) inode=12093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=64 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=65 name=(null) inode=12094 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=66 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=67 name=(null) inode=12095 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=68 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=69 name=(null) inode=12096 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=70 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=71 name=(null) inode=12097 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=72 name=(null) inode=12089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=73 name=(null) inode=12098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=74 name=(null) inode=12098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=75 name=(null) inode=12099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=76 name=(null) inode=12098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=77 name=(null) inode=12100 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=78 name=(null) inode=12098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=79 name=(null) inode=12101 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=80 name=(null) inode=12098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=81 name=(null) inode=12102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=82 name=(null) inode=12098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=83 name=(null) inode=12103 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=84 name=(null) inode=12089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=85 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=86 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=87 name=(null) inode=12105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=88 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=89 name=(null) inode=12106 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=90 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=91 name=(null) inode=12107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=92 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=93 name=(null) inode=12108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=94 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=95 name=(null) inode=12109 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=96 name=(null) inode=12089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=97 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=98 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=99 name=(null) inode=12111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=100 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=101 name=(null) inode=12112 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=102 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=103 name=(null) inode=12113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=104 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=105 name=(null) inode=12114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=106 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=107 name=(null) inode=12115 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PATH item=109 name=(null) inode=12116 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:24.628000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:27:24.671344 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:27:24.686666 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 14:27:24.698453 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 14:27:24.698806 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 14:27:24.699088 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 14:27:24.703334 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:27:24.713677 kernel: kvm: Nested Virtualization enabled Dec 13 14:27:24.713843 kernel: SVM: kvm: Nested Paging enabled Dec 13 14:27:24.713869 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 14:27:24.713897 kernel: SVM: Virtual GIF supported Dec 13 14:27:24.798347 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:27:24.822784 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:27:24.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.825002 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:27:24.837026 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:27:24.870571 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:27:24.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.879411 systemd[1]: Reached target cryptsetup.target. Dec 13 14:27:24.881793 systemd[1]: Starting lvm2-activation.service... Dec 13 14:27:24.886752 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:27:24.918676 systemd[1]: Finished lvm2-activation.service. Dec 13 14:27:24.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.930821 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:27:24.931799 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:27:24.931825 systemd[1]: Reached target local-fs.target. Dec 13 14:27:24.932700 systemd[1]: Reached target machines.target. Dec 13 14:27:24.934806 systemd[1]: Starting ldconfig.service... Dec 13 14:27:24.936056 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:24.936100 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:24.937029 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:27:24.938811 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:27:24.940925 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:27:24.946360 systemd[1]: Starting systemd-sysext.service... Dec 13 14:27:24.947606 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) Dec 13 14:27:24.948637 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:27:24.950164 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:27:24.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.963731 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:27:24.967899 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:27:24.968110 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:27:24.982009 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:27:24.993704 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) Dec 13 14:27:24.993704 systemd-fsck[1065]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 14:27:24.995117 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:27:24.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.998497 systemd[1]: Mounting boot.mount... Dec 13 14:27:25.011270 systemd[1]: Mounted boot.mount. Dec 13 14:27:25.455400 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:27:25.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.477332 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:27:25.490349 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:27:25.496225 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:27:25.497188 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:27:25.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.499419 (sd-sysext)[1070]: Using extensions 'kubernetes'. Dec 13 14:27:25.499785 (sd-sysext)[1070]: Merged extensions into '/usr'. Dec 13 14:27:25.516230 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:25.517958 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:27:25.518977 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:25.520453 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:25.606096 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:25.608690 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:25.609779 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:25.609990 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:25.610203 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:25.613825 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:27:25.615019 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:25.615171 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:25.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.616495 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:25.616626 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:25.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.617930 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:25.618039 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:25.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.641332 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:27:25.641475 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:27:25.642511 systemd[1]: Finished systemd-sysext.service. Dec 13 14:27:25.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.645615 systemd[1]: Starting ensure-sysext.service... Dec 13 14:27:25.647628 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:27:25.654344 systemd[1]: Reloading. Dec 13 14:27:25.656440 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:27:25.663091 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:27:25.664060 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:27:25.666546 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:27:25.735833 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2024-12-13T14:27:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:27:25.735866 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2024-12-13T14:27:25Z" level=info msg="torcx already run" Dec 13 14:27:25.848560 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:27:25.848583 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:27:25.883535 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:27:25.964000 audit: BPF prog-id=27 op=LOAD Dec 13 14:27:25.964000 audit: BPF prog-id=28 op=LOAD Dec 13 14:27:25.964000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:27:25.964000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:27:25.966000 audit: BPF prog-id=29 op=LOAD Dec 13 14:27:25.966000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:27:25.967000 audit: BPF prog-id=30 op=LOAD Dec 13 14:27:25.967000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:27:25.967000 audit: BPF prog-id=31 op=LOAD Dec 13 14:27:25.967000 audit: BPF prog-id=32 op=LOAD Dec 13 14:27:25.967000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:27:25.967000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:27:25.968000 audit: BPF prog-id=33 op=LOAD Dec 13 14:27:25.968000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:27:25.968000 audit: BPF prog-id=34 op=LOAD Dec 13 14:27:25.968000 audit: BPF prog-id=35 op=LOAD Dec 13 14:27:25.969000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:27:25.969000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:27:25.973495 systemd[1]: Finished ldconfig.service. Dec 13 14:27:25.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.975474 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:27:25.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.979190 systemd[1]: Starting audit-rules.service... Dec 13 14:27:25.981003 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:27:25.985000 audit: BPF prog-id=36 op=LOAD Dec 13 14:27:25.983301 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:27:25.986228 systemd[1]: Starting systemd-resolved.service... Dec 13 14:27:25.987000 audit: BPF prog-id=37 op=LOAD Dec 13 14:27:25.988834 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:27:25.991268 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:27:25.992812 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:27:25.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:25.995838 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:27:25.997551 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:25.997769 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:25.998855 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:26.000627 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:26.001000 audit[1150]: SYSTEM_BOOT pid=1150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:27:26.002495 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:26.003487 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:26.003623 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:26.003753 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:27:26.003841 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:26.005243 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:26.005449 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:26.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:26.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:26.006967 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:26.007068 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:26.007521 augenrules[1162]: No rules Dec 13 14:27:26.007000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:27:26.007000 audit[1162]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff61af5180 a2=420 a3=0 items=0 ppid=1139 pid=1162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:26.007000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:27:26.008544 systemd[1]: Finished audit-rules.service. Dec 13 14:27:26.009825 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:26.009960 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:26.011220 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:27:26.016627 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:26.016923 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:26.018411 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:26.020230 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:26.022040 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:26.022873 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:26.022977 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:26.024433 systemd[1]: Starting systemd-update-done.service... Dec 13 14:27:26.025299 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:27:26.025514 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:26.026499 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:27:26.028004 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:26.028096 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:26.029352 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:26.029445 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:26.031250 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:26.031356 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:26.033285 systemd[1]: Finished systemd-update-done.service. Dec 13 14:27:26.037200 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:26.037402 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:26.039243 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:26.041551 systemd[1]: Starting modprobe@drm.service... Dec 13 14:27:26.043537 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:26.045487 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:26.046339 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:26.046442 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:26.047674 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:27:26.048906 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:27:26.048998 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:26.049929 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:26.050027 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:26.051489 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:27:26.051601 systemd[1]: Finished modprobe@drm.service. Dec 13 14:27:26.052802 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:26.052908 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:26.054267 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:26.054488 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:26.055572 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:27:27.308404 systemd-timesyncd[1149]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 14:27:27.308446 systemd-timesyncd[1149]: Initial clock synchronization to Fri 2024-12-13 14:27:27.308329 UTC. Dec 13 14:27:27.310044 systemd[1]: Reached target time-set.target. Dec 13 14:27:27.310912 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:27:27.310952 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:27:27.311345 systemd[1]: Finished ensure-sysext.service. Dec 13 14:27:27.324083 systemd-resolved[1145]: Positive Trust Anchors: Dec 13 14:27:27.324098 systemd-resolved[1145]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:27:27.324136 systemd-resolved[1145]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:27:27.333046 systemd-resolved[1145]: Defaulting to hostname 'linux'. Dec 13 14:27:27.334899 systemd[1]: Started systemd-resolved.service. Dec 13 14:27:27.335843 systemd[1]: Reached target network.target. Dec 13 14:27:27.336658 systemd[1]: Reached target nss-lookup.target. Dec 13 14:27:27.337525 systemd[1]: Reached target sysinit.target. Dec 13 14:27:27.338518 systemd[1]: Started motdgen.path. Dec 13 14:27:27.339298 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:27:27.340531 systemd[1]: Started logrotate.timer. Dec 13 14:27:27.341367 systemd[1]: Started mdadm.timer. Dec 13 14:27:27.342082 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:27:27.342955 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:27:27.342978 systemd[1]: Reached target paths.target. Dec 13 14:27:27.343746 systemd[1]: Reached target timers.target. Dec 13 14:27:27.344807 systemd[1]: Listening on dbus.socket. Dec 13 14:27:27.346508 systemd[1]: Starting docker.socket... Dec 13 14:27:27.349566 systemd[1]: Listening on sshd.socket. Dec 13 14:27:27.350448 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:27.350781 systemd[1]: Listening on docker.socket. Dec 13 14:27:27.351637 systemd[1]: Reached target sockets.target. Dec 13 14:27:27.352450 systemd[1]: Reached target basic.target. Dec 13 14:27:27.353265 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:27:27.353286 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:27:27.354171 systemd[1]: Starting containerd.service... Dec 13 14:27:27.355878 systemd[1]: Starting dbus.service... Dec 13 14:27:27.357439 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:27:27.362280 jq[1182]: false Dec 13 14:27:27.359770 systemd[1]: Starting extend-filesystems.service... Dec 13 14:27:27.360704 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:27:27.361638 systemd[1]: Starting motdgen.service... Dec 13 14:27:27.363587 systemd[1]: Starting prepare-helm.service... Dec 13 14:27:27.365319 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:27:27.406582 extend-filesystems[1183]: Found loop1 Dec 13 14:27:27.406582 extend-filesystems[1183]: Found sr0 Dec 13 14:27:27.416799 extend-filesystems[1183]: Found vda Dec 13 14:27:27.416799 extend-filesystems[1183]: Found vda1 Dec 13 14:27:27.416799 extend-filesystems[1183]: Found vda2 Dec 13 14:27:27.416799 extend-filesystems[1183]: Found vda3 Dec 13 14:27:27.416799 extend-filesystems[1183]: Found usr Dec 13 14:27:27.416799 extend-filesystems[1183]: Found vda4 Dec 13 14:27:27.416799 extend-filesystems[1183]: Found vda6 Dec 13 14:27:27.416799 extend-filesystems[1183]: Found vda7 Dec 13 14:27:27.416799 extend-filesystems[1183]: Found vda9 Dec 13 14:27:27.416799 extend-filesystems[1183]: Checking size of /dev/vda9 Dec 13 14:27:27.414974 systemd[1]: Starting sshd-keygen.service... Dec 13 14:27:27.441434 extend-filesystems[1183]: Resized partition /dev/vda9 Dec 13 14:27:27.419679 dbus-daemon[1181]: [system] SELinux support is enabled Dec 13 14:27:27.424651 systemd[1]: Starting systemd-logind.service... Dec 13 14:27:27.427758 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:27.427831 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:27:27.444619 jq[1206]: true Dec 13 14:27:27.428291 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:27:27.447538 extend-filesystems[1208]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:27:27.451168 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 14:27:27.429694 systemd[1]: Starting update-engine.service... Dec 13 14:27:27.431533 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:27:27.433920 systemd[1]: Started dbus.service. Dec 13 14:27:27.440087 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:27:27.441231 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:27:27.441452 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:27:27.442438 systemd[1]: Finished motdgen.service. Dec 13 14:27:27.445200 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:27:27.445632 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:27:27.469210 jq[1210]: true Dec 13 14:27:27.469340 tar[1209]: linux-amd64/helm Dec 13 14:27:27.458428 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:27:27.458457 systemd[1]: Reached target system-config.target. Dec 13 14:27:27.459511 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:27:27.459532 systemd[1]: Reached target user-config.target. Dec 13 14:27:27.489341 update_engine[1205]: I1213 14:27:27.488919 1205 main.cc:92] Flatcar Update Engine starting Dec 13 14:27:27.493262 systemd[1]: Started update-engine.service. Dec 13 14:27:27.493422 update_engine[1205]: I1213 14:27:27.493285 1205 update_check_scheduler.cc:74] Next update check in 3m9s Dec 13 14:27:27.495976 systemd[1]: Started locksmithd.service. Dec 13 14:27:27.499203 systemd-logind[1203]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:27:27.499227 systemd-logind[1203]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:27:27.500482 systemd-logind[1203]: New seat seat0. Dec 13 14:27:27.502102 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 14:27:27.505344 systemd[1]: Started systemd-logind.service. Dec 13 14:27:27.544928 systemd-networkd[1029]: eth0: Gained IPv6LL Dec 13 14:27:27.564293 extend-filesystems[1208]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:27:27.564293 extend-filesystems[1208]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:27:27.564293 extend-filesystems[1208]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 14:27:27.547710 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:27:27.570157 extend-filesystems[1183]: Resized filesystem in /dev/vda9 Dec 13 14:27:27.572086 env[1212]: time="2024-12-13T14:27:27.569143390Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:27:27.549288 systemd[1]: Reached target network-online.target. Dec 13 14:27:27.555871 systemd[1]: Starting kubelet.service... Dec 13 14:27:27.568898 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:27:27.569038 systemd[1]: Finished extend-filesystems.service. Dec 13 14:27:27.573817 bash[1234]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:27:27.574456 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:27:27.658538 env[1212]: time="2024-12-13T14:27:27.658482553Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:27:27.658959 env[1212]: time="2024-12-13T14:27:27.658935021Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.661548633Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.661582286Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.661855979Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.661878391Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.661894331Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.661907516Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.662015789Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.662358081Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.662504475Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:27:27.663645 env[1212]: time="2024-12-13T14:27:27.662521737Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:27:27.664208 env[1212]: time="2024-12-13T14:27:27.662580297Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:27:27.664208 env[1212]: time="2024-12-13T14:27:27.662598952Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.669977460Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670033655Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670063721Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670112563Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670137951Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670156335Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670172365Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670194266Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670211609Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670228681Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670243959Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670262404Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:27:27.714665 env[1212]: time="2024-12-13T14:27:27.670429437Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:27:27.715547 env[1212]: time="2024-12-13T14:27:27.715491535Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:27:27.716008 env[1212]: time="2024-12-13T14:27:27.715981904Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:27:27.716068 env[1212]: time="2024-12-13T14:27:27.716037118Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716104 env[1212]: time="2024-12-13T14:27:27.716076372Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:27:27.716196 env[1212]: time="2024-12-13T14:27:27.716174055Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716247 env[1212]: time="2024-12-13T14:27:27.716198060Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716247 env[1212]: time="2024-12-13T14:27:27.716214931Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716289 env[1212]: time="2024-12-13T14:27:27.716239407Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716289 env[1212]: time="2024-12-13T14:27:27.716262541Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716328 env[1212]: time="2024-12-13T14:27:27.716285524Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716328 env[1212]: time="2024-12-13T14:27:27.716312234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716363 env[1212]: time="2024-12-13T14:27:27.716330538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716363 env[1212]: time="2024-12-13T14:27:27.716355144Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:27:27.716609 env[1212]: time="2024-12-13T14:27:27.716581208Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716652 env[1212]: time="2024-12-13T14:27:27.716615553Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716652 env[1212]: time="2024-12-13T14:27:27.716633967Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.716696 env[1212]: time="2024-12-13T14:27:27.716653153Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:27:27.716696 env[1212]: time="2024-12-13T14:27:27.716672670Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:27:27.716696 env[1212]: time="2024-12-13T14:27:27.716685985Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:27:27.716765 env[1212]: time="2024-12-13T14:27:27.716720209Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:27:27.716803 env[1212]: time="2024-12-13T14:27:27.716781173Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:27:27.717207 env[1212]: time="2024-12-13T14:27:27.717137752Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:27:27.718277 env[1212]: time="2024-12-13T14:27:27.717226028Z" level=info msg="Connect containerd service" Dec 13 14:27:27.718277 env[1212]: time="2024-12-13T14:27:27.717320665Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:27:27.718277 env[1212]: time="2024-12-13T14:27:27.718098524Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:27:27.718401 env[1212]: time="2024-12-13T14:27:27.718376215Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:27:27.718460 env[1212]: time="2024-12-13T14:27:27.718439273Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:27:27.718520 env[1212]: time="2024-12-13T14:27:27.718499977Z" level=info msg="containerd successfully booted in 0.156850s" Dec 13 14:27:27.719033 systemd[1]: Started containerd.service. Dec 13 14:27:27.728283 env[1212]: time="2024-12-13T14:27:27.728209946Z" level=info msg="Start subscribing containerd event" Dec 13 14:27:27.728419 env[1212]: time="2024-12-13T14:27:27.728303211Z" level=info msg="Start recovering state" Dec 13 14:27:27.728419 env[1212]: time="2024-12-13T14:27:27.728411745Z" level=info msg="Start event monitor" Dec 13 14:27:27.728468 env[1212]: time="2024-12-13T14:27:27.728455657Z" level=info msg="Start snapshots syncer" Dec 13 14:27:27.728491 env[1212]: time="2024-12-13T14:27:27.728480333Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:27:27.728530 env[1212]: time="2024-12-13T14:27:27.728490993Z" level=info msg="Start streaming server" Dec 13 14:27:27.768590 locksmithd[1222]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:27:28.345673 tar[1209]: linux-amd64/LICENSE Dec 13 14:27:28.345998 tar[1209]: linux-amd64/README.md Dec 13 14:27:28.351047 systemd[1]: Finished prepare-helm.service. Dec 13 14:27:28.527188 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:27:28.544970 systemd[1]: Finished sshd-keygen.service. Dec 13 14:27:28.547266 systemd[1]: Starting issuegen.service... Dec 13 14:27:28.566406 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:27:28.566520 systemd[1]: Finished issuegen.service. Dec 13 14:27:28.568342 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:27:28.575234 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:27:28.577483 systemd[1]: Started getty@tty1.service. Dec 13 14:27:28.579380 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:27:28.580633 systemd[1]: Reached target getty.target. Dec 13 14:27:28.946191 systemd[1]: Started kubelet.service. Dec 13 14:27:28.947586 systemd[1]: Reached target multi-user.target. Dec 13 14:27:28.950025 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:27:28.957699 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:27:28.957881 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:27:28.959223 systemd[1]: Startup finished in 762ms (kernel) + 4.735s (initrd) + 8.149s (userspace) = 13.648s. Dec 13 14:27:29.835869 kubelet[1263]: E1213 14:27:29.835764 1263 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:27:29.837904 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:27:29.838025 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:27:29.838266 systemd[1]: kubelet.service: Consumed 1.938s CPU time. Dec 13 14:27:36.703808 systemd[1]: Created slice system-sshd.slice. Dec 13 14:27:36.704863 systemd[1]: Started sshd@0-10.0.0.115:22-10.0.0.1:52114.service. Dec 13 14:27:36.750952 sshd[1273]: Accepted publickey for core from 10.0.0.1 port 52114 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:27:36.752602 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:36.760212 systemd[1]: Created slice user-500.slice. Dec 13 14:27:36.761296 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:27:36.762825 systemd-logind[1203]: New session 1 of user core. Dec 13 14:27:36.768712 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:27:36.770029 systemd[1]: Starting user@500.service... Dec 13 14:27:36.772602 (systemd)[1276]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:36.843565 systemd[1276]: Queued start job for default target default.target. Dec 13 14:27:36.844211 systemd[1276]: Reached target paths.target. Dec 13 14:27:36.844239 systemd[1276]: Reached target sockets.target. Dec 13 14:27:36.844255 systemd[1276]: Reached target timers.target. Dec 13 14:27:36.844267 systemd[1276]: Reached target basic.target. Dec 13 14:27:36.844307 systemd[1276]: Reached target default.target. Dec 13 14:27:36.844328 systemd[1276]: Startup finished in 66ms. Dec 13 14:27:36.844568 systemd[1]: Started user@500.service. Dec 13 14:27:36.845949 systemd[1]: Started session-1.scope. Dec 13 14:27:36.899651 systemd[1]: Started sshd@1-10.0.0.115:22-10.0.0.1:52118.service. Dec 13 14:27:36.941729 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 52118 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:27:36.942986 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:36.946815 systemd-logind[1203]: New session 2 of user core. Dec 13 14:27:36.947816 systemd[1]: Started session-2.scope. Dec 13 14:27:37.000765 sshd[1285]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:37.003721 systemd[1]: sshd@1-10.0.0.115:22-10.0.0.1:52118.service: Deactivated successfully. Dec 13 14:27:37.004368 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:27:37.004932 systemd-logind[1203]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:27:37.005935 systemd[1]: Started sshd@2-10.0.0.115:22-10.0.0.1:52128.service. Dec 13 14:27:37.006716 systemd-logind[1203]: Removed session 2. Dec 13 14:27:37.046250 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 52128 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:27:37.047308 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:37.051083 systemd-logind[1203]: New session 3 of user core. Dec 13 14:27:37.052001 systemd[1]: Started session-3.scope. Dec 13 14:27:37.101471 sshd[1291]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:37.105134 systemd[1]: Started sshd@3-10.0.0.115:22-10.0.0.1:52138.service. Dec 13 14:27:37.105746 systemd[1]: sshd@2-10.0.0.115:22-10.0.0.1:52128.service: Deactivated successfully. Dec 13 14:27:37.106451 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:27:37.107030 systemd-logind[1203]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:27:37.107993 systemd-logind[1203]: Removed session 3. Dec 13 14:27:37.147420 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 52138 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:27:37.148613 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:37.151932 systemd-logind[1203]: New session 4 of user core. Dec 13 14:27:37.152649 systemd[1]: Started session-4.scope. Dec 13 14:27:37.205666 sshd[1296]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:37.208538 systemd[1]: sshd@3-10.0.0.115:22-10.0.0.1:52138.service: Deactivated successfully. Dec 13 14:27:37.209069 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:27:37.209590 systemd-logind[1203]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:27:37.210737 systemd[1]: Started sshd@4-10.0.0.115:22-10.0.0.1:52148.service. Dec 13 14:27:37.211566 systemd-logind[1203]: Removed session 4. Dec 13 14:27:37.250660 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 52148 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:27:37.251786 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:37.256087 systemd-logind[1203]: New session 5 of user core. Dec 13 14:27:37.257066 systemd[1]: Started session-5.scope. Dec 13 14:27:37.314310 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:27:37.314490 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:37.323287 dbus-daemon[1181]: \xd0\u000dA\xcc\xc7U: received setenforce notice (enforcing=-920739424) Dec 13 14:27:37.325398 sudo[1306]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:37.327237 sshd[1303]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:37.330574 systemd[1]: sshd@4-10.0.0.115:22-10.0.0.1:52148.service: Deactivated successfully. Dec 13 14:27:37.331117 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:27:37.331641 systemd-logind[1203]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:27:37.332813 systemd[1]: Started sshd@5-10.0.0.115:22-10.0.0.1:52164.service. Dec 13 14:27:37.333692 systemd-logind[1203]: Removed session 5. Dec 13 14:27:37.375610 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 52164 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:27:37.377309 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:37.381576 systemd-logind[1203]: New session 6 of user core. Dec 13 14:27:37.382381 systemd[1]: Started session-6.scope. Dec 13 14:27:37.437593 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:27:37.437797 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:37.440833 sudo[1314]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:37.445341 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:27:37.445535 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:37.455245 systemd[1]: Stopping audit-rules.service... Dec 13 14:27:37.455000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:27:37.457160 auditctl[1317]: No rules Dec 13 14:27:37.456700 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:27:37.456852 systemd[1]: Stopped audit-rules.service. Dec 13 14:27:37.457397 kernel: kauditd_printk_skb: 159 callbacks suppressed Dec 13 14:27:37.457433 kernel: audit: type=1305 audit(1734100057.455:191): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:27:37.458280 systemd[1]: Starting audit-rules.service... Dec 13 14:27:37.455000 audit[1317]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcb43196e0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.465615 kernel: audit: type=1300 audit(1734100057.455:191): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcb43196e0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.465771 kernel: audit: type=1327 audit(1734100057.455:191): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:27:37.455000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:27:37.467457 kernel: audit: type=1131 audit(1734100057.455:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.474912 augenrules[1334]: No rules Dec 13 14:27:37.475473 systemd[1]: Finished audit-rules.service. Dec 13 14:27:37.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.476548 sudo[1313]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:37.475000 audit[1313]: USER_END pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.480020 sshd[1310]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:37.482529 systemd[1]: sshd@5-10.0.0.115:22-10.0.0.1:52164.service: Deactivated successfully. Dec 13 14:27:37.483408 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:27:37.484066 kernel: audit: type=1130 audit(1734100057.474:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.484108 kernel: audit: type=1106 audit(1734100057.475:194): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.475000 audit[1313]: CRED_DISP pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.484373 systemd-logind[1203]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:27:37.488073 kernel: audit: type=1104 audit(1734100057.475:195): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.488132 kernel: audit: type=1106 audit(1734100057.480:196): pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:37.480000 audit[1310]: USER_END pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:37.489066 systemd[1]: Started sshd@6-10.0.0.115:22-10.0.0.1:52172.service. Dec 13 14:27:37.489658 systemd-logind[1203]: Removed session 6. Dec 13 14:27:37.480000 audit[1310]: CRED_DISP pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:37.496461 kernel: audit: type=1104 audit(1734100057.480:197): pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:37.496508 kernel: audit: type=1131 audit(1734100057.481:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.115:22-10.0.0.1:52164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.115:22-10.0.0.1:52164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.115:22-10.0.0.1:52172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.532000 audit[1340]: USER_ACCT pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:37.534165 sshd[1340]: Accepted publickey for core from 10.0.0.1 port 52172 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:27:37.533000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:37.533000 audit[1340]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2345b450 a2=3 a3=0 items=0 ppid=1 pid=1340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.533000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:37.535268 sshd[1340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:37.538674 systemd-logind[1203]: New session 7 of user core. Dec 13 14:27:37.539364 systemd[1]: Started session-7.scope. Dec 13 14:27:37.543000 audit[1340]: USER_START pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:37.544000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:37.594000 audit[1343]: USER_ACCT pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.594000 audit[1343]: CRED_REFR pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.595901 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:27:37.596136 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:37.596000 audit[1343]: USER_START pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.628797 systemd[1]: Starting docker.service... Dec 13 14:27:37.779859 env[1355]: time="2024-12-13T14:27:37.779777043Z" level=info msg="Starting up" Dec 13 14:27:37.781301 env[1355]: time="2024-12-13T14:27:37.781281163Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:27:37.781301 env[1355]: time="2024-12-13T14:27:37.781299137Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:27:37.781301 env[1355]: time="2024-12-13T14:27:37.781316640Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock <nil> 0 <nil>}] <nil> <nil>}" module=grpc Dec 13 14:27:37.781463 env[1355]: time="2024-12-13T14:27:37.781330085Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:27:37.782943 env[1355]: time="2024-12-13T14:27:37.782922491Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:27:37.782943 env[1355]: time="2024-12-13T14:27:37.782938892Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:27:37.783022 env[1355]: time="2024-12-13T14:27:37.782952337Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock <nil> 0 <nil>}] <nil> <nil>}" module=grpc Dec 13 14:27:37.783022 env[1355]: time="2024-12-13T14:27:37.782961645Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:27:37.788117 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4227333094-merged.mount: Deactivated successfully. Dec 13 14:27:37.884348 env[1355]: time="2024-12-13T14:27:37.884293107Z" level=info msg="Loading containers: start." Dec 13 14:27:37.940000 audit[1389]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.940000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe5dc4bcb0 a2=0 a3=7ffe5dc4bc9c items=0 ppid=1355 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:27:37.942000 audit[1391]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.942000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffd2c90700 a2=0 a3=7fffd2c906ec items=0 ppid=1355 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.942000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:27:37.944000 audit[1393]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.944000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc98952d90 a2=0 a3=7ffc98952d7c items=0 ppid=1355 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:27:37.945000 audit[1395]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.945000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff1b8c8850 a2=0 a3=7fff1b8c883c items=0 ppid=1355 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:27:37.948000 audit[1397]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.948000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3a4bd810 a2=0 a3=7ffc3a4bd7fc items=0 ppid=1355 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.948000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:27:37.962000 audit[1402]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.962000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff3d440b20 a2=0 a3=7fff3d440b0c items=0 ppid=1355 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:27:37.978000 audit[1404]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.978000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc548f6910 a2=0 a3=7ffc548f68fc items=0 ppid=1355 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.978000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:27:37.984000 audit[1406]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.984000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff9f648760 a2=0 a3=7fff9f64874c items=0 ppid=1355 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.984000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:27:37.986000 audit[1408]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.986000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff76ae45b0 a2=0 a3=7fff76ae459c items=0 ppid=1355 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:37.996000 audit[1412]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:37.996000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc55edce80 a2=0 a3=7ffc55edce6c items=0 ppid=1355 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:38.006000 audit[1413]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.006000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff62195520 a2=0 a3=7fff6219550c items=0 ppid=1355 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.006000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:38.017080 kernel: Initializing XFRM netlink socket Dec 13 14:27:38.049604 env[1355]: time="2024-12-13T14:27:38.049463621Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:27:38.068000 audit[1422]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.068000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc33c19bb0 a2=0 a3=7ffc33c19b9c items=0 ppid=1355 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.068000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:27:38.079000 audit[1425]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.079000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcbad33e60 a2=0 a3=7ffcbad33e4c items=0 ppid=1355 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.079000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:27:38.082000 audit[1428]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.082000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc17aeac80 a2=0 a3=7ffc17aeac6c items=0 ppid=1355 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.082000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:27:38.084000 audit[1430]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.084000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd33eee3a0 a2=0 a3=7ffd33eee38c items=0 ppid=1355 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.084000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:27:38.086000 audit[1432]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.086000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc387e0630 a2=0 a3=7ffc387e061c items=0 ppid=1355 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.086000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:27:38.088000 audit[1434]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.088000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd8f5c35e0 a2=0 a3=7ffd8f5c35cc items=0 ppid=1355 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.088000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:27:38.090000 audit[1436]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.090000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe118ad820 a2=0 a3=7ffe118ad80c items=0 ppid=1355 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.090000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:27:38.098000 audit[1439]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.098000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd28e2b1a0 a2=0 a3=7ffd28e2b18c items=0 ppid=1355 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:27:38.100000 audit[1441]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.100000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffebc359bd0 a2=0 a3=7ffebc359bbc items=0 ppid=1355 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.100000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:27:38.102000 audit[1443]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.102000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc23be2000 a2=0 a3=7ffc23be1fec items=0 ppid=1355 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:27:38.104000 audit[1445]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.104000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6a917b40 a2=0 a3=7fff6a917b2c items=0 ppid=1355 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.104000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:27:38.105629 systemd-networkd[1029]: docker0: Link UP Dec 13 14:27:38.115000 audit[1449]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.115000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb917f280 a2=0 a3=7ffcb917f26c items=0 ppid=1355 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:38.124000 audit[1450]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:38.124000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffc566cc70 a2=0 a3=7fffc566cc5c items=0 ppid=1355 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.124000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:38.125881 env[1355]: time="2024-12-13T14:27:38.125830707Z" level=info msg="Loading containers: done." Dec 13 14:27:38.145981 env[1355]: time="2024-12-13T14:27:38.145902118Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:27:38.146268 env[1355]: time="2024-12-13T14:27:38.146195468Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:27:38.146367 env[1355]: time="2024-12-13T14:27:38.146340279Z" level=info msg="Daemon has completed initialization" Dec 13 14:27:38.166780 systemd[1]: Started docker.service. Dec 13 14:27:38.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:38.172342 env[1355]: time="2024-12-13T14:27:38.172253055Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:27:39.128674 env[1212]: time="2024-12-13T14:27:39.128617520Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 14:27:40.021370 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:27:40.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.021604 systemd[1]: Stopped kubelet.service. Dec 13 14:27:40.021676 systemd[1]: kubelet.service: Consumed 1.938s CPU time. Dec 13 14:27:40.023732 systemd[1]: Starting kubelet.service... Dec 13 14:27:40.152946 systemd[1]: Started kubelet.service. Dec 13 14:27:40.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.421528 kubelet[1497]: E1213 14:27:40.421379 1497 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:27:40.424952 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:27:40.425115 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:27:40.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:27:41.189579 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1335815083.mount: Deactivated successfully. Dec 13 14:27:43.862821 env[1212]: time="2024-12-13T14:27:43.862757362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:43.864722 env[1212]: time="2024-12-13T14:27:43.864679607Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:43.866463 env[1212]: time="2024-12-13T14:27:43.866416845Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:43.868828 env[1212]: time="2024-12-13T14:27:43.868775017Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:43.869840 env[1212]: time="2024-12-13T14:27:43.869806431Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 14:27:43.888965 env[1212]: time="2024-12-13T14:27:43.888924745Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 14:27:47.488025 env[1212]: time="2024-12-13T14:27:47.487964079Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:47.490456 env[1212]: time="2024-12-13T14:27:47.490418221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:47.492415 env[1212]: time="2024-12-13T14:27:47.492384609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:47.494351 env[1212]: time="2024-12-13T14:27:47.494301914Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:47.495178 env[1212]: time="2024-12-13T14:27:47.495146638Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 14:27:47.506952 env[1212]: time="2024-12-13T14:27:47.506902485Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 14:27:50.007390 env[1212]: time="2024-12-13T14:27:50.007325991Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:50.009445 env[1212]: time="2024-12-13T14:27:50.009393439Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:50.011428 env[1212]: time="2024-12-13T14:27:50.011394952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:50.013192 env[1212]: time="2024-12-13T14:27:50.013162848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:50.014013 env[1212]: time="2024-12-13T14:27:50.013976263Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 14:27:50.025069 env[1212]: time="2024-12-13T14:27:50.025017700Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:27:50.521293 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:27:50.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.521524 systemd[1]: Stopped kubelet.service. Dec 13 14:27:50.522441 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:27:50.522508 kernel: audit: type=1130 audit(1734100070.520:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.522959 systemd[1]: Starting kubelet.service... Dec 13 14:27:50.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.528672 kernel: audit: type=1131 audit(1734100070.520:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.609386 systemd[1]: Started kubelet.service. Dec 13 14:27:50.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.614080 kernel: audit: type=1130 audit(1734100070.608:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.799368 kubelet[1529]: E1213 14:27:50.799205 1529 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:27:50.801937 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:27:50.802073 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:27:50.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:27:50.807105 kernel: audit: type=1131 audit(1734100070.801:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:27:52.149548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3369132173.mount: Deactivated successfully. Dec 13 14:27:52.893364 env[1212]: time="2024-12-13T14:27:52.893294332Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:52.895501 env[1212]: time="2024-12-13T14:27:52.895451918Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:52.897151 env[1212]: time="2024-12-13T14:27:52.897084079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:52.898772 env[1212]: time="2024-12-13T14:27:52.898704128Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:52.899218 env[1212]: time="2024-12-13T14:27:52.899177054Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:27:52.914271 env[1212]: time="2024-12-13T14:27:52.914227519Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:27:53.443180 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3706517688.mount: Deactivated successfully. Dec 13 14:27:54.883259 env[1212]: time="2024-12-13T14:27:54.883177964Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:54.886018 env[1212]: time="2024-12-13T14:27:54.885962807Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:54.888219 env[1212]: time="2024-12-13T14:27:54.888151501Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:54.890541 env[1212]: time="2024-12-13T14:27:54.890512950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:54.891487 env[1212]: time="2024-12-13T14:27:54.891432575Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:27:54.908859 env[1212]: time="2024-12-13T14:27:54.908804002Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:27:55.634968 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1309059576.mount: Deactivated successfully. Dec 13 14:27:55.644461 env[1212]: time="2024-12-13T14:27:55.644380691Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:55.647438 env[1212]: time="2024-12-13T14:27:55.647380266Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:55.651912 env[1212]: time="2024-12-13T14:27:55.651842485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:55.661683 env[1212]: time="2024-12-13T14:27:55.661618709Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:55.661930 env[1212]: time="2024-12-13T14:27:55.661881000Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:27:55.730793 env[1212]: time="2024-12-13T14:27:55.730735247Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 14:27:56.401515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3314276511.mount: Deactivated successfully. Dec 13 14:27:59.953888 env[1212]: time="2024-12-13T14:27:59.953808477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:00.035254 env[1212]: time="2024-12-13T14:28:00.035159307Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:00.102602 env[1212]: time="2024-12-13T14:28:00.102532858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:00.116660 env[1212]: time="2024-12-13T14:28:00.116595567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:00.117540 env[1212]: time="2024-12-13T14:28:00.117499091Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 14:28:01.021357 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:28:01.021584 systemd[1]: Stopped kubelet.service. Dec 13 14:28:01.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:01.023163 systemd[1]: Starting kubelet.service... Dec 13 14:28:01.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:01.030282 kernel: audit: type=1130 audit(1734100081.020:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:01.030453 kernel: audit: type=1131 audit(1734100081.020:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:01.099130 systemd[1]: Started kubelet.service. Dec 13 14:28:01.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:01.104078 kernel: audit: type=1130 audit(1734100081.098:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:01.142697 kubelet[1637]: E1213 14:28:01.142626 1637 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:28:01.144821 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:28:01.144941 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:28:01.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:28:01.150083 kernel: audit: type=1131 audit(1734100081.144:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:28:02.978170 systemd[1]: Stopped kubelet.service. Dec 13 14:28:02.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:02.980238 systemd[1]: Starting kubelet.service... Dec 13 14:28:02.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:02.985969 kernel: audit: type=1130 audit(1734100082.977:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:02.986164 kernel: audit: type=1131 audit(1734100082.977:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:02.998920 systemd[1]: Reloading. Dec 13 14:28:03.061686 /usr/lib/systemd/system-generators/torcx-generator[1670]: time="2024-12-13T14:28:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:28:03.061719 /usr/lib/systemd/system-generators/torcx-generator[1670]: time="2024-12-13T14:28:03Z" level=info msg="torcx already run" Dec 13 14:28:03.532832 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:28:03.532848 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:28:03.549927 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:28:03.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.615083 kernel: audit: type=1400 audit(1734100083.607:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.615134 kernel: audit: type=1400 audit(1734100083.607:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.615154 kernel: audit: type=1400 audit(1734100083.607:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.621179 kernel: audit: type=1400 audit(1734100083.607:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit: BPF prog-id=43 op=LOAD Dec 13 14:28:03.614000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit: BPF prog-id=44 op=LOAD Dec 13 14:28:03.620000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.620000 audit: BPF prog-id=45 op=LOAD Dec 13 14:28:03.620000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:28:03.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit: BPF prog-id=46 op=LOAD Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit: BPF prog-id=47 op=LOAD Dec 13 14:28:03.622000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:28:03.622000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit: BPF prog-id=48 op=LOAD Dec 13 14:28:03.623000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit: BPF prog-id=49 op=LOAD Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.623000 audit: BPF prog-id=50 op=LOAD Dec 13 14:28:03.623000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:28:03.623000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.624000 audit: BPF prog-id=51 op=LOAD Dec 13 14:28:03.624000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit: BPF prog-id=52 op=LOAD Dec 13 14:28:03.625000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit: BPF prog-id=53 op=LOAD Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.625000 audit: BPF prog-id=54 op=LOAD Dec 13 14:28:03.625000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:28:03.625000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit: BPF prog-id=55 op=LOAD Dec 13 14:28:03.626000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit: BPF prog-id=56 op=LOAD Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:03.626000 audit: BPF prog-id=57 op=LOAD Dec 13 14:28:03.626000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:28:03.626000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:28:03.636660 systemd[1]: Started kubelet.service. Dec 13 14:28:03.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:03.637785 systemd[1]: Stopping kubelet.service... Dec 13 14:28:03.638006 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:28:03.638166 systemd[1]: Stopped kubelet.service. Dec 13 14:28:03.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:03.639514 systemd[1]: Starting kubelet.service... Dec 13 14:28:03.714451 systemd[1]: Started kubelet.service. Dec 13 14:28:03.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:03.762575 kubelet[1718]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:03.762575 kubelet[1718]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:28:03.762575 kubelet[1718]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:03.764085 kubelet[1718]: I1213 14:28:03.763987 1718 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:28:04.017516 kubelet[1718]: I1213 14:28:04.017398 1718 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:28:04.017516 kubelet[1718]: I1213 14:28:04.017430 1718 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:28:04.017775 kubelet[1718]: I1213 14:28:04.017744 1718 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:28:04.040852 kubelet[1718]: E1213 14:28:04.040811 1718 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.115:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.041835 kubelet[1718]: I1213 14:28:04.041815 1718 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:28:04.053383 kubelet[1718]: I1213 14:28:04.053346 1718 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:28:04.053623 kubelet[1718]: I1213 14:28:04.053601 1718 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:28:04.053804 kubelet[1718]: I1213 14:28:04.053782 1718 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:28:04.053939 kubelet[1718]: I1213 14:28:04.053814 1718 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:28:04.053939 kubelet[1718]: I1213 14:28:04.053823 1718 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:28:04.053993 kubelet[1718]: I1213 14:28:04.053963 1718 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:04.054121 kubelet[1718]: I1213 14:28:04.054103 1718 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:28:04.054148 kubelet[1718]: I1213 14:28:04.054128 1718 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:28:04.054169 kubelet[1718]: I1213 14:28:04.054161 1718 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:28:04.054216 kubelet[1718]: I1213 14:28:04.054205 1718 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:28:04.054593 kubelet[1718]: W1213 14:28:04.054551 1718 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.115:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.054657 kubelet[1718]: E1213 14:28:04.054602 1718 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.115:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.054911 kubelet[1718]: W1213 14:28:04.054880 1718 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.054911 kubelet[1718]: E1213 14:28:04.054910 1718 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.055498 kubelet[1718]: I1213 14:28:04.055471 1718 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:28:04.061790 kubelet[1718]: I1213 14:28:04.061761 1718 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:28:04.063212 kubelet[1718]: W1213 14:28:04.062925 1718 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:28:04.063834 kubelet[1718]: I1213 14:28:04.063818 1718 server.go:1256] "Started kubelet" Dec 13 14:28:04.063962 kubelet[1718]: I1213 14:28:04.063939 1718 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:28:04.064177 kubelet[1718]: I1213 14:28:04.064161 1718 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:28:04.064389 kubelet[1718]: I1213 14:28:04.064376 1718 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:28:04.065079 kubelet[1718]: I1213 14:28:04.065035 1718 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:28:04.065527 kubelet[1718]: I1213 14:28:04.065496 1718 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:28:04.065527 kubelet[1718]: I1213 14:28:04.065529 1718 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:28:04.065610 kubelet[1718]: I1213 14:28:04.065594 1718 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:28:04.064000 audit[1718]: AVC avc: denied { mac_admin } for pid=1718 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:04.064000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:04.064000 audit[1718]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000703b90 a1=c000d0d158 a2=c000703b60 a3=25 items=0 ppid=1 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.064000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:04.064000 audit[1718]: AVC avc: denied { mac_admin } for pid=1718 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:04.064000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:04.064000 audit[1718]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cacc80 a1=c000d0d170 a2=c000703c20 a3=25 items=0 ppid=1 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.064000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:04.069000 audit[1730]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:04.070586 kubelet[1718]: E1213 14:28:04.070467 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:28:04.070586 kubelet[1718]: I1213 14:28:04.070504 1718 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:28:04.070696 kubelet[1718]: I1213 14:28:04.070611 1718 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:28:04.070696 kubelet[1718]: I1213 14:28:04.070695 1718 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:28:04.069000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd97032a40 a2=0 a3=7ffd97032a2c items=0 ppid=1718 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:28:04.070940 kubelet[1718]: E1213 14:28:04.070864 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.115:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.115:6443: connect: connection refused" interval="200ms" Dec 13 14:28:04.071107 kubelet[1718]: W1213 14:28:04.071037 1718 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.115:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.071107 kubelet[1718]: E1213 14:28:04.071108 1718 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.115:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.070000 audit[1731]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:04.070000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5b0241f0 a2=0 a3=7ffe5b0241dc items=0 ppid=1718 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:28:04.072552 kubelet[1718]: E1213 14:28:04.072536 1718 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:28:04.072656 kubelet[1718]: I1213 14:28:04.072629 1718 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:28:04.072734 kubelet[1718]: I1213 14:28:04.072708 1718 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:28:04.073605 kubelet[1718]: I1213 14:28:04.073589 1718 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:28:04.073731 kubelet[1718]: E1213 14:28:04.073712 1718 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.115:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.115:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c2d6bb98d7fe default 0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:28:04.063787006 +0000 UTC m=+0.342167272,LastTimestamp:2024-12-13 14:28:04.063787006 +0000 UTC m=+0.342167272,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:28:04.074000 audit[1733]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:04.074000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff8fd97dd0 a2=0 a3=7fff8fd97dbc items=0 ppid=1718 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:04.076000 audit[1735]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:04.076000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa4b957e0 a2=0 a3=7fffa4b957cc items=0 ppid=1718 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:04.084000 audit[1740]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:04.084000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc9fd39160 a2=0 a3=7ffc9fd3914c items=0 ppid=1718 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:28:04.085867 kubelet[1718]: I1213 14:28:04.085830 1718 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:28:04.085000 audit[1742]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:04.085000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd92706e60 a2=0 a3=7ffd92706e4c items=0 ppid=1718 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:28:04.087074 kubelet[1718]: I1213 14:28:04.086977 1718 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:28:04.087074 kubelet[1718]: I1213 14:28:04.087017 1718 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:28:04.087074 kubelet[1718]: I1213 14:28:04.087042 1718 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:28:04.087147 kubelet[1718]: E1213 14:28:04.087111 1718 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:28:04.087645 kubelet[1718]: W1213 14:28:04.087606 1718 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.115:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.087645 kubelet[1718]: E1213 14:28:04.087648 1718 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.115:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.086000 audit[1743]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:04.086000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd3194310 a2=0 a3=7ffcd31942fc items=0 ppid=1718 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:28:04.087000 audit[1745]: NETFILTER_CFG table=nat:33 family=10 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:04.087000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff3f091c80 a2=0 a3=7fff3f091c6c items=0 ppid=1718 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:28:04.087000 audit[1744]: NETFILTER_CFG table=mangle:34 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:04.087000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff3bae7f0 a2=0 a3=7ffff3bae7dc items=0 ppid=1718 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:28:04.088000 audit[1746]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:04.088000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff62206370 a2=0 a3=7fff6220635c items=0 ppid=1718 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:28:04.088000 audit[1747]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:04.088000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc905fdd0 a2=0 a3=7fffc905fdbc items=0 ppid=1718 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:28:04.090249 kubelet[1718]: I1213 14:28:04.090218 1718 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:28:04.090249 kubelet[1718]: I1213 14:28:04.090241 1718 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:28:04.090328 kubelet[1718]: I1213 14:28:04.090261 1718 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:04.089000 audit[1748]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:04.089000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdeea8b3d0 a2=0 a3=7ffdeea8b3bc items=0 ppid=1718 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:28:04.175105 kubelet[1718]: I1213 14:28:04.175068 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:04.175525 kubelet[1718]: E1213 14:28:04.175504 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.115:6443/api/v1/nodes\": dial tcp 10.0.0.115:6443: connect: connection refused" node="localhost" Dec 13 14:28:04.187673 kubelet[1718]: E1213 14:28:04.187629 1718 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:28:04.271641 kubelet[1718]: E1213 14:28:04.271609 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.115:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.115:6443: connect: connection refused" interval="400ms" Dec 13 14:28:04.377269 kubelet[1718]: I1213 14:28:04.377229 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:04.377678 kubelet[1718]: E1213 14:28:04.377649 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.115:6443/api/v1/nodes\": dial tcp 10.0.0.115:6443: connect: connection refused" node="localhost" Dec 13 14:28:04.388729 kubelet[1718]: E1213 14:28:04.388698 1718 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:28:04.672393 kubelet[1718]: E1213 14:28:04.672263 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.115:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.115:6443: connect: connection refused" interval="800ms" Dec 13 14:28:04.779274 kubelet[1718]: I1213 14:28:04.779244 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:04.779690 kubelet[1718]: E1213 14:28:04.779663 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.115:6443/api/v1/nodes\": dial tcp 10.0.0.115:6443: connect: connection refused" node="localhost" Dec 13 14:28:04.789791 kubelet[1718]: E1213 14:28:04.789741 1718 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:28:04.862667 kubelet[1718]: I1213 14:28:04.862605 1718 policy_none.go:49] "None policy: Start" Dec 13 14:28:04.863388 kubelet[1718]: I1213 14:28:04.863368 1718 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:28:04.863452 kubelet[1718]: I1213 14:28:04.863407 1718 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:28:04.868453 kubelet[1718]: W1213 14:28:04.868399 1718 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.868453 kubelet[1718]: E1213 14:28:04.868451 1718 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:04.870670 systemd[1]: Created slice kubepods.slice. Dec 13 14:28:04.873960 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:28:04.876210 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:28:04.884000 audit[1718]: AVC avc: denied { mac_admin } for pid=1718 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:04.884000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:04.884000 audit[1718]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00106c5d0 a1=c001074558 a2=c00106c5a0 a3=25 items=0 ppid=1 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:04.884000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:04.885981 kubelet[1718]: I1213 14:28:04.885679 1718 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:28:04.885981 kubelet[1718]: I1213 14:28:04.885748 1718 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:28:04.885981 kubelet[1718]: I1213 14:28:04.885943 1718 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:28:04.887399 kubelet[1718]: E1213 14:28:04.887379 1718 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 14:28:05.123087 kubelet[1718]: W1213 14:28:05.123015 1718 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.115:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:05.123087 kubelet[1718]: E1213 14:28:05.123084 1718 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.115:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:05.415084 kubelet[1718]: W1213 14:28:05.414885 1718 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.115:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:05.415084 kubelet[1718]: E1213 14:28:05.414974 1718 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.115:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:05.449535 kubelet[1718]: W1213 14:28:05.449472 1718 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.115:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:05.449535 kubelet[1718]: E1213 14:28:05.449522 1718 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.115:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:05.473250 kubelet[1718]: E1213 14:28:05.473197 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.115:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.115:6443: connect: connection refused" interval="1.6s" Dec 13 14:28:05.581380 kubelet[1718]: I1213 14:28:05.581336 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:05.581672 kubelet[1718]: E1213 14:28:05.581651 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.115:6443/api/v1/nodes\": dial tcp 10.0.0.115:6443: connect: connection refused" node="localhost" Dec 13 14:28:05.590813 kubelet[1718]: I1213 14:28:05.590784 1718 topology_manager.go:215] "Topology Admit Handler" podUID="e162792f68bf69c7545467b67e480ade" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:28:05.591561 kubelet[1718]: I1213 14:28:05.591542 1718 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:28:05.592307 kubelet[1718]: I1213 14:28:05.592291 1718 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:28:05.596590 systemd[1]: Created slice kubepods-burstable-pode162792f68bf69c7545467b67e480ade.slice. Dec 13 14:28:05.605254 systemd[1]: Created slice kubepods-burstable-pod4f8e0d694c07e04969646aa3c152c34a.slice. Dec 13 14:28:05.611981 systemd[1]: Created slice kubepods-burstable-podc4144e8f85b2123a6afada0c1705bbba.slice. Dec 13 14:28:05.679011 kubelet[1718]: I1213 14:28:05.678468 1718 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e162792f68bf69c7545467b67e480ade-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"e162792f68bf69c7545467b67e480ade\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:05.679011 kubelet[1718]: I1213 14:28:05.678511 1718 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:05.679011 kubelet[1718]: I1213 14:28:05.678528 1718 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:05.679011 kubelet[1718]: I1213 14:28:05.678546 1718 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:05.679011 kubelet[1718]: I1213 14:28:05.678565 1718 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:28:05.679336 kubelet[1718]: I1213 14:28:05.678584 1718 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e162792f68bf69c7545467b67e480ade-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"e162792f68bf69c7545467b67e480ade\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:05.679336 kubelet[1718]: I1213 14:28:05.678645 1718 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e162792f68bf69c7545467b67e480ade-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"e162792f68bf69c7545467b67e480ade\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:05.679336 kubelet[1718]: I1213 14:28:05.678710 1718 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:05.679336 kubelet[1718]: I1213 14:28:05.678736 1718 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:05.904944 kubelet[1718]: E1213 14:28:05.904893 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:05.905765 env[1212]: time="2024-12-13T14:28:05.905721918Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:e162792f68bf69c7545467b67e480ade,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:05.906882 kubelet[1718]: E1213 14:28:05.906834 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:05.907357 env[1212]: time="2024-12-13T14:28:05.907329875Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:05.913594 kubelet[1718]: E1213 14:28:05.913573 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:05.914064 env[1212]: time="2024-12-13T14:28:05.914005759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:06.114570 kubelet[1718]: E1213 14:28:06.114523 1718 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.115:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:06.719874 kubelet[1718]: W1213 14:28:06.719772 1718 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:06.719874 kubelet[1718]: E1213 14:28:06.719856 1718 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.115:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.115:6443: connect: connection refused Dec 13 14:28:06.854771 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3026664446.mount: Deactivated successfully. Dec 13 14:28:06.861395 env[1212]: time="2024-12-13T14:28:06.861346391Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.864244 env[1212]: time="2024-12-13T14:28:06.864205600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.865097 env[1212]: time="2024-12-13T14:28:06.865066530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.866069 env[1212]: time="2024-12-13T14:28:06.866029295Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.868785 env[1212]: time="2024-12-13T14:28:06.868755730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.870017 env[1212]: time="2024-12-13T14:28:06.869986426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.871206 env[1212]: time="2024-12-13T14:28:06.871168918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.872621 env[1212]: time="2024-12-13T14:28:06.872581270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.873381 env[1212]: time="2024-12-13T14:28:06.873348583Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.875246 env[1212]: time="2024-12-13T14:28:06.875213746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.876934 env[1212]: time="2024-12-13T14:28:06.876883469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.878401 env[1212]: time="2024-12-13T14:28:06.878363750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.904608 env[1212]: time="2024-12-13T14:28:06.904433938Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:06.904608 env[1212]: time="2024-12-13T14:28:06.904467853Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:06.904608 env[1212]: time="2024-12-13T14:28:06.904478463Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:06.904799 env[1212]: time="2024-12-13T14:28:06.904641424Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f6a617fb5667f2e76db23cca9240bb6626352a45a85d211cce5b2fd1ece8f49 pid=1771 runtime=io.containerd.runc.v2 Dec 13 14:28:06.906779 env[1212]: time="2024-12-13T14:28:06.906242114Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:06.906779 env[1212]: time="2024-12-13T14:28:06.906263685Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:06.906779 env[1212]: time="2024-12-13T14:28:06.906272802Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:06.906779 env[1212]: time="2024-12-13T14:28:06.906411657Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/316980467319c0647b8a3d59343eb029e7b35fa23783138f67beb8f0fd100c4a pid=1772 runtime=io.containerd.runc.v2 Dec 13 14:28:06.907602 env[1212]: time="2024-12-13T14:28:06.907559965Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:06.907697 env[1212]: time="2024-12-13T14:28:06.907586155Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:06.907697 env[1212]: time="2024-12-13T14:28:06.907597276Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:06.907802 env[1212]: time="2024-12-13T14:28:06.907695073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a857a14fcebd1601b2c601d3db86bb6c0153e02307cf33e67deefd34326d5902 pid=1761 runtime=io.containerd.runc.v2 Dec 13 14:28:06.918042 systemd[1]: Started cri-containerd-2f6a617fb5667f2e76db23cca9240bb6626352a45a85d211cce5b2fd1ece8f49.scope. Dec 13 14:28:06.920291 systemd[1]: Started cri-containerd-a857a14fcebd1601b2c601d3db86bb6c0153e02307cf33e67deefd34326d5902.scope. Dec 13 14:28:06.924415 systemd[1]: Started cri-containerd-316980467319c0647b8a3d59343eb029e7b35fa23783138f67beb8f0fd100c4a.scope. Dec 13 14:28:06.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.939702 kernel: kauditd_printk_skb: 219 callbacks suppressed Dec 13 14:28:06.939796 kernel: audit: type=1400 audit(1734100086.934:437): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.950290 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:28:06.950351 kernel: audit: type=1400 audit(1734100086.934:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.950378 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:28:06.950398 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:28:06.950418 kernel: audit: backlog limit exceeded Dec 13 14:28:06.950477 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:28:06.950498 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:28:06.950519 kernel: audit: backlog limit exceeded Dec 13 14:28:06.950551 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:28:06.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit: BPF prog-id=58 op=LOAD Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1771 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:06.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266366136313766623536363766326537366462323363636139323430 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=1771 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:06.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266366136313766623536363766326537366462323363636139323430 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.935000 audit: BPF prog-id=59 op=LOAD Dec 13 14:28:06.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit: BPF prog-id=60 op=LOAD Dec 13 14:28:06.935000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000241850 items=0 ppid=1771 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:06.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266366136313766623536363766326537366462323363636139323430 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit: BPF prog-id=61 op=LOAD Dec 13 14:28:06.938000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000241898 items=0 ppid=1771 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:06.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266366136313766623536363766326537366462323363636139323430 Dec 13 14:28:06.938000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:28:06.938000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:06.938000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000241ca8 items=0 ppid=1771 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:06.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266366136313766623536363766326537366462323363636139323430 Dec 13 14:28:06.979329 env[1212]: time="2024-12-13T14:28:06.976994510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,} returns sandbox id \"316980467319c0647b8a3d59343eb029e7b35fa23783138f67beb8f0fd100c4a\"" Dec 13 14:28:06.979825 env[1212]: time="2024-12-13T14:28:06.979772513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,} returns sandbox id \"2f6a617fb5667f2e76db23cca9240bb6626352a45a85d211cce5b2fd1ece8f49\"" Dec 13 14:28:06.980314 env[1212]: time="2024-12-13T14:28:06.980283878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:e162792f68bf69c7545467b67e480ade,Namespace:kube-system,Attempt:0,} returns sandbox id \"a857a14fcebd1601b2c601d3db86bb6c0153e02307cf33e67deefd34326d5902\"" Dec 13 14:28:06.981754 kubelet[1718]: E1213 14:28:06.981720 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:06.982354 kubelet[1718]: E1213 14:28:06.982333 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:06.982424 kubelet[1718]: E1213 14:28:06.982406 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:06.985992 env[1212]: time="2024-12-13T14:28:06.985964613Z" level=info msg="CreateContainer within sandbox \"316980467319c0647b8a3d59343eb029e7b35fa23783138f67beb8f0fd100c4a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:28:06.986445 env[1212]: time="2024-12-13T14:28:06.986406275Z" level=info msg="CreateContainer within sandbox \"2f6a617fb5667f2e76db23cca9240bb6626352a45a85d211cce5b2fd1ece8f49\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:28:06.986824 env[1212]: time="2024-12-13T14:28:06.986788173Z" level=info msg="CreateContainer within sandbox \"a857a14fcebd1601b2c601d3db86bb6c0153e02307cf33e67deefd34326d5902\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:28:07.007228 env[1212]: time="2024-12-13T14:28:07.007162496Z" level=info msg="CreateContainer within sandbox \"316980467319c0647b8a3d59343eb029e7b35fa23783138f67beb8f0fd100c4a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a38cca6c8f3d3b41ac8c8b8462b05a060413d3f26405e702e596fc08a2e15f28\"" Dec 13 14:28:07.007898 env[1212]: time="2024-12-13T14:28:07.007875514Z" level=info msg="StartContainer for \"a38cca6c8f3d3b41ac8c8b8462b05a060413d3f26405e702e596fc08a2e15f28\"" Dec 13 14:28:07.018365 env[1212]: time="2024-12-13T14:28:07.018307203Z" level=info msg="CreateContainer within sandbox \"a857a14fcebd1601b2c601d3db86bb6c0153e02307cf33e67deefd34326d5902\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"19a25b20106a24fe405955cc3d92bf439c552ea161792e03c2d3aa1d8be454a0\"" Dec 13 14:28:07.019102 env[1212]: time="2024-12-13T14:28:07.019047632Z" level=info msg="StartContainer for \"19a25b20106a24fe405955cc3d92bf439c552ea161792e03c2d3aa1d8be454a0\"" Dec 13 14:28:07.020931 env[1212]: time="2024-12-13T14:28:07.020897584Z" level=info msg="CreateContainer within sandbox \"2f6a617fb5667f2e76db23cca9240bb6626352a45a85d211cce5b2fd1ece8f49\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"1b3e5471c65b56d5eb03dea043951376a63d1466c4172ad52b9776ddc39de556\"" Dec 13 14:28:07.021740 env[1212]: time="2024-12-13T14:28:07.021684482Z" level=info msg="StartContainer for \"1b3e5471c65b56d5eb03dea043951376a63d1466c4172ad52b9776ddc39de556\"" Dec 13 14:28:07.021854 systemd[1]: Started cri-containerd-a38cca6c8f3d3b41ac8c8b8462b05a060413d3f26405e702e596fc08a2e15f28.scope. Dec 13 14:28:07.038100 systemd[1]: Started cri-containerd-19a25b20106a24fe405955cc3d92bf439c552ea161792e03c2d3aa1d8be454a0.scope. Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit: BPF prog-id=70 op=LOAD Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1772 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133386363613663386633643362343161633863386238343632623035 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1772 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133386363613663386633643362343161633863386238343632623035 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.041000 audit: BPF prog-id=71 op=LOAD Dec 13 14:28:07.041000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009b050 items=0 ppid=1772 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133386363613663386633643362343161633863386238343632623035 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit: BPF prog-id=72 op=LOAD Dec 13 14:28:07.042000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009b098 items=0 ppid=1772 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133386363613663386633643362343161633863386238343632623035 Dec 13 14:28:07.042000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:28:07.042000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.042000 audit: BPF prog-id=73 op=LOAD Dec 13 14:28:07.042000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b4a8 items=0 ppid=1772 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133386363613663386633643362343161633863386238343632623035 Dec 13 14:28:07.047762 systemd[1]: Started cri-containerd-1b3e5471c65b56d5eb03dea043951376a63d1466c4172ad52b9776ddc39de556.scope. Dec 13 14:28:07.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.052000 audit: BPF prog-id=74 op=LOAD Dec 13 14:28:07.052000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.052000 audit[1908]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1761 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613235623230313036613234666534303539353563633364393262 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1761 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613235623230313036613234666534303539353563633364393262 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.053000 audit: BPF prog-id=75 op=LOAD Dec 13 14:28:07.053000 audit[1908]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ecb60 items=0 ppid=1761 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613235623230313036613234666534303539353563633364393262 Dec 13 14:28:07.054000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.054000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.054000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.054000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.054000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.054000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.054000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.054000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.054000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.054000 audit: BPF prog-id=76 op=LOAD Dec 13 14:28:07.054000 audit[1908]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ecba8 items=0 ppid=1761 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613235623230313036613234666534303539353563633364393262 Dec 13 14:28:07.055000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:28:07.055000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { perfmon } for pid=1908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit[1908]: AVC avc: denied { bpf } for pid=1908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.055000 audit: BPF prog-id=77 op=LOAD Dec 13 14:28:07.055000 audit[1908]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ecfb8 items=0 ppid=1761 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139613235623230313036613234666534303539353563633364393262 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit: BPF prog-id=78 op=LOAD Dec 13 14:28:07.060000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.060000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1771 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162336535343731633635623536643565623033646561303433393531 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1771 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162336535343731633635623536643565623033646561303433393531 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.061000 audit: BPF prog-id=79 op=LOAD Dec 13 14:28:07.061000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000375040 items=0 ppid=1771 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162336535343731633635623536643565623033646561303433393531 Dec 13 14:28:07.062000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.062000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.062000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.062000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.062000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.062000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.062000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.062000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.062000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.062000 audit: BPF prog-id=80 op=LOAD Dec 13 14:28:07.062000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000375088 items=0 ppid=1771 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162336535343731633635623536643565623033646561303433393531 Dec 13 14:28:07.063000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:28:07.063000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:07.063000 audit: BPF prog-id=81 op=LOAD Dec 13 14:28:07.063000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000375498 items=0 ppid=1771 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:07.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162336535343731633635623536643565623033646561303433393531 Dec 13 14:28:07.073636 kubelet[1718]: E1213 14:28:07.073599 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.115:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.115:6443: connect: connection refused" interval="3.2s" Dec 13 14:28:07.080162 env[1212]: time="2024-12-13T14:28:07.080127781Z" level=info msg="StartContainer for \"a38cca6c8f3d3b41ac8c8b8462b05a060413d3f26405e702e596fc08a2e15f28\" returns successfully" Dec 13 14:28:07.085017 env[1212]: time="2024-12-13T14:28:07.084968647Z" level=info msg="StartContainer for \"19a25b20106a24fe405955cc3d92bf439c552ea161792e03c2d3aa1d8be454a0\" returns successfully" Dec 13 14:28:07.096788 kubelet[1718]: E1213 14:28:07.096758 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:07.098311 kubelet[1718]: E1213 14:28:07.098286 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:07.102197 env[1212]: time="2024-12-13T14:28:07.102162769Z" level=info msg="StartContainer for \"1b3e5471c65b56d5eb03dea043951376a63d1466c4172ad52b9776ddc39de556\" returns successfully" Dec 13 14:28:07.183732 kubelet[1718]: I1213 14:28:07.183690 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:07.827000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:07.827000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a403f0 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:07.827000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:07.828000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:07.828000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000da0040 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:07.828000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:07.934000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:07.934000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007c4cea0 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:28:07.934000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:07.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:07.934000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:07.934000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00360dce0 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:28:07.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:07.934000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006ee8e70 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:28:07.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:07.935000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:07.935000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c006ee8ea0 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:28:07.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:07.936000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:07.936000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c00332ec40 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:28:07.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:07.936000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:07.936000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c006ee9050 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:28:07.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:08.056324 kubelet[1718]: I1213 14:28:08.056281 1718 apiserver.go:52] "Watching apiserver" Dec 13 14:28:08.056687 kubelet[1718]: I1213 14:28:08.056469 1718 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:28:08.071498 kubelet[1718]: I1213 14:28:08.071436 1718 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:28:08.103337 kubelet[1718]: E1213 14:28:08.103237 1718 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:08.104287 kubelet[1718]: E1213 14:28:08.103632 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:08.104287 kubelet[1718]: E1213 14:28:08.103709 1718 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" Dec 13 14:28:08.104287 kubelet[1718]: E1213 14:28:08.103907 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:09.105206 kubelet[1718]: E1213 14:28:09.105176 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:09.892212 kubelet[1718]: E1213 14:28:09.892169 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:10.103381 kubelet[1718]: E1213 14:28:10.103348 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:10.103381 kubelet[1718]: E1213 14:28:10.103374 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:10.855488 systemd[1]: Reloading. Dec 13 14:28:10.924260 /usr/lib/systemd/system-generators/torcx-generator[2011]: time="2024-12-13T14:28:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:28:10.924289 /usr/lib/systemd/system-generators/torcx-generator[2011]: time="2024-12-13T14:28:10Z" level=info msg="torcx already run" Dec 13 14:28:10.999847 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:28:10.999863 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:28:11.017467 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.085000 audit: BPF prog-id=82 op=LOAD Dec 13 14:28:11.085000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.086000 audit: BPF prog-id=83 op=LOAD Dec 13 14:28:11.086000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.088000 audit: BPF prog-id=84 op=LOAD Dec 13 14:28:11.088000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit: BPF prog-id=85 op=LOAD Dec 13 14:28:11.089000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.089000 audit: BPF prog-id=86 op=LOAD Dec 13 14:28:11.089000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.090000 audit: BPF prog-id=87 op=LOAD Dec 13 14:28:11.090000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit: BPF prog-id=88 op=LOAD Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.091000 audit: BPF prog-id=89 op=LOAD Dec 13 14:28:11.091000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:28:11.091000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit: BPF prog-id=90 op=LOAD Dec 13 14:28:11.092000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit: BPF prog-id=91 op=LOAD Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit: BPF prog-id=92 op=LOAD Dec 13 14:28:11.093000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:28:11.093000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.093000 audit: BPF prog-id=93 op=LOAD Dec 13 14:28:11.093000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.094000 audit: BPF prog-id=94 op=LOAD Dec 13 14:28:11.094000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit: BPF prog-id=95 op=LOAD Dec 13 14:28:11.095000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.095000 audit: BPF prog-id=96 op=LOAD Dec 13 14:28:11.096000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit: BPF prog-id=97 op=LOAD Dec 13 14:28:11.096000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit: BPF prog-id=98 op=LOAD Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.096000 audit: BPF prog-id=99 op=LOAD Dec 13 14:28:11.096000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:28:11.096000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit: BPF prog-id=100 op=LOAD Dec 13 14:28:11.097000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit: BPF prog-id=101 op=LOAD Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.098000 audit: BPF prog-id=102 op=LOAD Dec 13 14:28:11.098000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:28:11.098000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:28:11.108769 kubelet[1718]: I1213 14:28:11.108683 1718 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:28:11.108734 systemd[1]: Stopping kubelet.service... Dec 13 14:28:11.132319 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:28:11.132484 systemd[1]: Stopped kubelet.service. Dec 13 14:28:11.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:11.134024 systemd[1]: Starting kubelet.service... Dec 13 14:28:11.206577 systemd[1]: Started kubelet.service. Dec 13 14:28:11.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:11.244328 kubelet[2056]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:11.244328 kubelet[2056]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:28:11.244328 kubelet[2056]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:11.244793 kubelet[2056]: I1213 14:28:11.244362 2056 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:28:11.250230 kubelet[2056]: I1213 14:28:11.250162 2056 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:28:11.250230 kubelet[2056]: I1213 14:28:11.250193 2056 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:28:11.250581 kubelet[2056]: I1213 14:28:11.250548 2056 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:28:11.251980 kubelet[2056]: I1213 14:28:11.251962 2056 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:28:11.253649 kubelet[2056]: I1213 14:28:11.253618 2056 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:28:11.260048 kubelet[2056]: I1213 14:28:11.260027 2056 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:28:11.260278 kubelet[2056]: I1213 14:28:11.260259 2056 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:28:11.260424 kubelet[2056]: I1213 14:28:11.260409 2056 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:28:11.260514 kubelet[2056]: I1213 14:28:11.260431 2056 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:28:11.260514 kubelet[2056]: I1213 14:28:11.260440 2056 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:28:11.260514 kubelet[2056]: I1213 14:28:11.260465 2056 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:11.260598 kubelet[2056]: I1213 14:28:11.260540 2056 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:28:11.260598 kubelet[2056]: I1213 14:28:11.260554 2056 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:28:11.260598 kubelet[2056]: I1213 14:28:11.260575 2056 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:28:11.260598 kubelet[2056]: I1213 14:28:11.260588 2056 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:28:11.260978 kubelet[2056]: I1213 14:28:11.260962 2056 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:28:11.261160 kubelet[2056]: I1213 14:28:11.261145 2056 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:28:11.265964 kubelet[2056]: I1213 14:28:11.265945 2056 server.go:1256] "Started kubelet" Dec 13 14:28:11.266000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.266000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:11.266000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000da66f0 a1=c000dac4b0 a2=c000da66c0 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:11.266000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:11.266000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.266000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:11.266000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000763600 a1=c000dac4c8 a2=c000da6780 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:11.266000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:11.267945 kubelet[2056]: I1213 14:28:11.267654 2056 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:28:11.267945 kubelet[2056]: I1213 14:28:11.267685 2056 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:28:11.267945 kubelet[2056]: I1213 14:28:11.267713 2056 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:28:11.270470 kubelet[2056]: I1213 14:28:11.270453 2056 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:28:11.273383 kubelet[2056]: I1213 14:28:11.272080 2056 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:28:11.273383 kubelet[2056]: I1213 14:28:11.272108 2056 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:28:11.273383 kubelet[2056]: I1213 14:28:11.272679 2056 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:28:11.273540 kubelet[2056]: I1213 14:28:11.273432 2056 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:28:11.273862 kubelet[2056]: I1213 14:28:11.273848 2056 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:28:11.275706 kubelet[2056]: I1213 14:28:11.274759 2056 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:28:11.278722 kubelet[2056]: I1213 14:28:11.278344 2056 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:28:11.279224 kubelet[2056]: I1213 14:28:11.279201 2056 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:28:11.279293 kubelet[2056]: I1213 14:28:11.279232 2056 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:28:11.279293 kubelet[2056]: I1213 14:28:11.279261 2056 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:28:11.279346 kubelet[2056]: E1213 14:28:11.279306 2056 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:28:11.281532 kubelet[2056]: I1213 14:28:11.281504 2056 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:28:11.281621 kubelet[2056]: I1213 14:28:11.281591 2056 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:28:11.282498 kubelet[2056]: I1213 14:28:11.282480 2056 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:28:11.283421 kubelet[2056]: E1213 14:28:11.283408 2056 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:28:11.304369 kubelet[2056]: I1213 14:28:11.304334 2056 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:28:11.304369 kubelet[2056]: I1213 14:28:11.304370 2056 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:28:11.304546 kubelet[2056]: I1213 14:28:11.304388 2056 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:11.304546 kubelet[2056]: I1213 14:28:11.304541 2056 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:28:11.304589 kubelet[2056]: I1213 14:28:11.304565 2056 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:28:11.304589 kubelet[2056]: I1213 14:28:11.304572 2056 policy_none.go:49] "None policy: Start" Dec 13 14:28:11.305215 kubelet[2056]: I1213 14:28:11.305195 2056 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:28:11.305215 kubelet[2056]: I1213 14:28:11.305216 2056 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:28:11.305477 kubelet[2056]: I1213 14:28:11.305460 2056 state_mem.go:75] "Updated machine memory state" Dec 13 14:28:11.308859 kubelet[2056]: I1213 14:28:11.308834 2056 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:28:11.307000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:11.307000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:11.307000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bf6840 a1=c0006f8d08 a2=c000bf6810 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:11.307000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:11.309136 kubelet[2056]: I1213 14:28:11.308892 2056 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:28:11.309136 kubelet[2056]: I1213 14:28:11.309082 2056 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:28:11.375873 kubelet[2056]: I1213 14:28:11.375790 2056 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:11.379948 kubelet[2056]: I1213 14:28:11.379881 2056 topology_manager.go:215] "Topology Admit Handler" podUID="e162792f68bf69c7545467b67e480ade" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:28:11.380533 kubelet[2056]: I1213 14:28:11.380511 2056 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:28:11.380596 kubelet[2056]: I1213 14:28:11.380570 2056 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:28:11.429742 kubelet[2056]: E1213 14:28:11.429709 2056 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:11.429981 kubelet[2056]: E1213 14:28:11.429710 2056 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Dec 13 14:28:11.429981 kubelet[2056]: I1213 14:28:11.429854 2056 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 14:28:11.430095 kubelet[2056]: I1213 14:28:11.430071 2056 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:28:11.476857 kubelet[2056]: I1213 14:28:11.476816 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:11.476857 kubelet[2056]: I1213 14:28:11.476866 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:28:11.477223 kubelet[2056]: I1213 14:28:11.476891 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:11.477223 kubelet[2056]: I1213 14:28:11.476964 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:11.477223 kubelet[2056]: I1213 14:28:11.477026 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e162792f68bf69c7545467b67e480ade-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"e162792f68bf69c7545467b67e480ade\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:11.477223 kubelet[2056]: I1213 14:28:11.477099 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e162792f68bf69c7545467b67e480ade-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"e162792f68bf69c7545467b67e480ade\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:11.477223 kubelet[2056]: I1213 14:28:11.477146 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e162792f68bf69c7545467b67e480ade-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"e162792f68bf69c7545467b67e480ade\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:11.477402 kubelet[2056]: I1213 14:28:11.477199 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:11.477402 kubelet[2056]: I1213 14:28:11.477257 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:11.595000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:28:11.595000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ae7ac0 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:11.595000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:11.728403 kubelet[2056]: E1213 14:28:11.728287 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:11.730610 kubelet[2056]: E1213 14:28:11.730570 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:11.730824 kubelet[2056]: E1213 14:28:11.730803 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:12.261495 kubelet[2056]: I1213 14:28:12.261434 2056 apiserver.go:52] "Watching apiserver" Dec 13 14:28:12.274182 kubelet[2056]: I1213 14:28:12.274130 2056 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:28:12.289098 kubelet[2056]: E1213 14:28:12.289078 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:12.289229 kubelet[2056]: E1213 14:28:12.289209 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:12.289686 kubelet[2056]: E1213 14:28:12.289666 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:12.313161 update_engine[1205]: I1213 14:28:12.313113 1205 update_attempter.cc:509] Updating boot flags... Dec 13 14:28:12.443689 kubelet[2056]: I1213 14:28:12.442585 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=3.44252102 podStartE2EDuration="3.44252102s" podCreationTimestamp="2024-12-13 14:28:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:28:12.409719773 +0000 UTC m=+1.199820662" watchObservedRunningTime="2024-12-13 14:28:12.44252102 +0000 UTC m=+1.232621900" Dec 13 14:28:12.461284 kubelet[2056]: I1213 14:28:12.459671 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=3.45963121 podStartE2EDuration="3.45963121s" podCreationTimestamp="2024-12-13 14:28:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:28:12.459405552 +0000 UTC m=+1.249506431" watchObservedRunningTime="2024-12-13 14:28:12.45963121 +0000 UTC m=+1.249732079" Dec 13 14:28:12.461284 kubelet[2056]: I1213 14:28:12.459838 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.459819887 podStartE2EDuration="1.459819887s" podCreationTimestamp="2024-12-13 14:28:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:28:12.442869842 +0000 UTC m=+1.232970721" watchObservedRunningTime="2024-12-13 14:28:12.459819887 +0000 UTC m=+1.249920766" Dec 13 14:28:13.291593 kubelet[2056]: E1213 14:28:13.291561 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:13.596000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.598748 kernel: kauditd_printk_skb: 769 callbacks suppressed Dec 13 14:28:13.598885 kernel: audit: type=1400 audit(1734100093.596:778): avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.596000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000da02c0 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:13.607259 kernel: audit: type=1300 audit(1734100093.596:778): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000da02c0 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:13.596000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:13.611502 kernel: audit: type=1327 audit(1734100093.596:778): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:13.596000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.615201 kernel: audit: type=1400 audit(1734100093.596:779): avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.615263 kernel: audit: type=1300 audit(1734100093.596:779): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cf6bc0 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:13.596000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cf6bc0 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:13.596000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:13.624076 kernel: audit: type=1327 audit(1734100093.596:779): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:13.624123 kernel: audit: type=1400 audit(1734100093.596:780): avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.596000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.596000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cf6c00 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:13.632545 kernel: audit: type=1300 audit(1734100093.596:780): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cf6c00 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:13.632660 kernel: audit: type=1327 audit(1734100093.596:780): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:13.596000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:13.596000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.640448 kernel: audit: type=1400 audit(1734100093.596:781): avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.596000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cf6c40 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:28:13.596000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:15.007929 kubelet[2056]: E1213 14:28:15.007872 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:15.272540 kubelet[2056]: E1213 14:28:15.272508 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:15.902139 sudo[1343]: pam_unix(sudo:session): session closed for user root Dec 13 14:28:15.901000 audit[1343]: USER_END pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:15.901000 audit[1343]: CRED_DISP pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:15.903731 sshd[1340]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:15.903000 audit[1340]: USER_END pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:15.903000 audit[1340]: CRED_DISP pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:15.906390 systemd[1]: sshd@6-10.0.0.115:22-10.0.0.1:52172.service: Deactivated successfully. Dec 13 14:28:15.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.115:22-10.0.0.1:52172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:15.907140 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:28:15.907281 systemd[1]: session-7.scope: Consumed 4.974s CPU time. Dec 13 14:28:15.907761 systemd-logind[1203]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:28:15.908494 systemd-logind[1203]: Removed session 7. Dec 13 14:28:17.189420 kubelet[2056]: E1213 14:28:17.189355 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:17.296895 kubelet[2056]: E1213 14:28:17.296868 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:18.299029 kubelet[2056]: E1213 14:28:18.298988 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:24.353094 kubelet[2056]: I1213 14:28:24.353028 2056 topology_manager.go:215] "Topology Admit Handler" podUID="75ece1eb-ee05-4ea9-bd6b-786632cff0d7" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-grv2b" Dec 13 14:28:24.358291 systemd[1]: Created slice kubepods-besteffort-pod75ece1eb_ee05_4ea9_bd6b_786632cff0d7.slice. Dec 13 14:28:24.361799 kubelet[2056]: I1213 14:28:24.361757 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/75ece1eb-ee05-4ea9-bd6b-786632cff0d7-var-lib-calico\") pod \"tigera-operator-c7ccbd65-grv2b\" (UID: \"75ece1eb-ee05-4ea9-bd6b-786632cff0d7\") " pod="tigera-operator/tigera-operator-c7ccbd65-grv2b" Dec 13 14:28:24.361799 kubelet[2056]: I1213 14:28:24.361811 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-njxcs\" (UniqueName: \"kubernetes.io/projected/75ece1eb-ee05-4ea9-bd6b-786632cff0d7-kube-api-access-njxcs\") pod \"tigera-operator-c7ccbd65-grv2b\" (UID: \"75ece1eb-ee05-4ea9-bd6b-786632cff0d7\") " pod="tigera-operator/tigera-operator-c7ccbd65-grv2b" Dec 13 14:28:24.368932 kubelet[2056]: I1213 14:28:24.368886 2056 topology_manager.go:215] "Topology Admit Handler" podUID="9aaff59b-e18d-4f2c-96b9-548019a26b95" podNamespace="kube-system" podName="kube-proxy-dp74t" Dec 13 14:28:24.374874 systemd[1]: Created slice kubepods-besteffort-pod9aaff59b_e18d_4f2c_96b9_548019a26b95.slice. Dec 13 14:28:24.444680 kubelet[2056]: I1213 14:28:24.444629 2056 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:28:24.445177 env[1212]: time="2024-12-13T14:28:24.445110906Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:28:24.445501 kubelet[2056]: I1213 14:28:24.445351 2056 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:28:24.462853 kubelet[2056]: I1213 14:28:24.462780 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9aaff59b-e18d-4f2c-96b9-548019a26b95-kube-proxy\") pod \"kube-proxy-dp74t\" (UID: \"9aaff59b-e18d-4f2c-96b9-548019a26b95\") " pod="kube-system/kube-proxy-dp74t" Dec 13 14:28:24.462853 kubelet[2056]: I1213 14:28:24.462830 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9aaff59b-e18d-4f2c-96b9-548019a26b95-lib-modules\") pod \"kube-proxy-dp74t\" (UID: \"9aaff59b-e18d-4f2c-96b9-548019a26b95\") " pod="kube-system/kube-proxy-dp74t" Dec 13 14:28:24.462853 kubelet[2056]: I1213 14:28:24.462863 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9aaff59b-e18d-4f2c-96b9-548019a26b95-xtables-lock\") pod \"kube-proxy-dp74t\" (UID: \"9aaff59b-e18d-4f2c-96b9-548019a26b95\") " pod="kube-system/kube-proxy-dp74t" Dec 13 14:28:24.463197 kubelet[2056]: I1213 14:28:24.462894 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xc7n7\" (UniqueName: \"kubernetes.io/projected/9aaff59b-e18d-4f2c-96b9-548019a26b95-kube-api-access-xc7n7\") pod \"kube-proxy-dp74t\" (UID: \"9aaff59b-e18d-4f2c-96b9-548019a26b95\") " pod="kube-system/kube-proxy-dp74t" Dec 13 14:28:24.667406 env[1212]: time="2024-12-13T14:28:24.667252895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-grv2b,Uid:75ece1eb-ee05-4ea9-bd6b-786632cff0d7,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:28:24.679585 kubelet[2056]: E1213 14:28:24.679521 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:24.680193 env[1212]: time="2024-12-13T14:28:24.680114847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dp74t,Uid:9aaff59b-e18d-4f2c-96b9-548019a26b95,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:24.687364 env[1212]: time="2024-12-13T14:28:24.687297786Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:24.687364 env[1212]: time="2024-12-13T14:28:24.687338622Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:24.687364 env[1212]: time="2024-12-13T14:28:24.687348872Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:24.687565 env[1212]: time="2024-12-13T14:28:24.687483486Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2dc526825bfd3f825b9029b96e2af3a4b15fb93e93485c4eca659c8aeae19b16 pid=2169 runtime=io.containerd.runc.v2 Dec 13 14:28:24.700003 systemd[1]: Started cri-containerd-2dc526825bfd3f825b9029b96e2af3a4b15fb93e93485c4eca659c8aeae19b16.scope. Dec 13 14:28:24.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.713103 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:28:24.713204 kernel: audit: type=1400 audit(1734100104.711:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.720431 kernel: audit: type=1400 audit(1734100104.711:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.720562 kernel: audit: type=1400 audit(1734100104.711:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.745799 kernel: audit: type=1400 audit(1734100104.711:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.745890 kernel: audit: type=1400 audit(1734100104.711:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.751746 kernel: audit: type=1400 audit(1734100104.711:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.751810 kernel: audit: type=1400 audit(1734100104.711:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.757708 kernel: audit: type=1400 audit(1734100104.711:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.757755 kernel: audit: type=1400 audit(1734100104.711:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.761537 kernel: audit: type=1400 audit(1734100104.715:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.715000 audit: BPF prog-id=103 op=LOAD Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2169 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:24.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633532363832356266643366383235623930323962393665326166 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2169 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:24.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633532363832356266643366383235623930323962393665326166 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.718000 audit: BPF prog-id=104 op=LOAD Dec 13 14:28:24.718000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002917a0 items=0 ppid=2169 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:24.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633532363832356266643366383235623930323962393665326166 Dec 13 14:28:24.719000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.719000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.719000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.719000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.719000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.719000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.719000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.719000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.719000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.719000 audit: BPF prog-id=105 op=LOAD Dec 13 14:28:24.719000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002917e8 items=0 ppid=2169 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:24.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633532363832356266643366383235623930323962393665326166 Dec 13 14:28:24.741000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:28:24.741000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:24.741000 audit: BPF prog-id=106 op=LOAD Dec 13 14:28:24.741000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000291bf8 items=0 ppid=2169 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:24.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633532363832356266643366383235623930323962393665326166 Dec 13 14:28:24.784091 env[1212]: time="2024-12-13T14:28:24.783656043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-grv2b,Uid:75ece1eb-ee05-4ea9-bd6b-786632cff0d7,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"2dc526825bfd3f825b9029b96e2af3a4b15fb93e93485c4eca659c8aeae19b16\"" Dec 13 14:28:24.785763 env[1212]: time="2024-12-13T14:28:24.785706729Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:28:24.984334 env[1212]: time="2024-12-13T14:28:24.984155540Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:24.984334 env[1212]: time="2024-12-13T14:28:24.984198130Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:24.984334 env[1212]: time="2024-12-13T14:28:24.984209070Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:24.984576 env[1212]: time="2024-12-13T14:28:24.984351710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17f50ed065200ec30432f52ae151cec0430bcf5124fd84cb23a15a949b6716ec pid=2210 runtime=io.containerd.runc.v2 Dec 13 14:28:24.994240 systemd[1]: Started cri-containerd-17f50ed065200ec30432f52ae151cec0430bcf5124fd84cb23a15a949b6716ec.scope. Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit: BPF prog-id=107 op=LOAD Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2210 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663530656430363532303065633330343332663532616531353163 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2210 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663530656430363532303065633330343332663532616531353163 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.004000 audit: BPF prog-id=108 op=LOAD Dec 13 14:28:25.004000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218a60 items=0 ppid=2210 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663530656430363532303065633330343332663532616531353163 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit: BPF prog-id=109 op=LOAD Dec 13 14:28:25.005000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218aa8 items=0 ppid=2210 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663530656430363532303065633330343332663532616531353163 Dec 13 14:28:25.005000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:28:25.005000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.005000 audit: BPF prog-id=110 op=LOAD Dec 13 14:28:25.005000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218eb8 items=0 ppid=2210 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663530656430363532303065633330343332663532616531353163 Dec 13 14:28:25.011814 kubelet[2056]: E1213 14:28:25.011788 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:25.019332 env[1212]: time="2024-12-13T14:28:25.019282356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dp74t,Uid:9aaff59b-e18d-4f2c-96b9-548019a26b95,Namespace:kube-system,Attempt:0,} returns sandbox id \"17f50ed065200ec30432f52ae151cec0430bcf5124fd84cb23a15a949b6716ec\"" Dec 13 14:28:25.020134 kubelet[2056]: E1213 14:28:25.020084 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:25.022354 env[1212]: time="2024-12-13T14:28:25.022325831Z" level=info msg="CreateContainer within sandbox \"17f50ed065200ec30432f52ae151cec0430bcf5124fd84cb23a15a949b6716ec\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:28:25.043207 env[1212]: time="2024-12-13T14:28:25.043120844Z" level=info msg="CreateContainer within sandbox \"17f50ed065200ec30432f52ae151cec0430bcf5124fd84cb23a15a949b6716ec\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4ae0ffca7daec68244a6deb28710274731e5063f30d7613986239651ec718520\"" Dec 13 14:28:25.044067 env[1212]: time="2024-12-13T14:28:25.043951468Z" level=info msg="StartContainer for \"4ae0ffca7daec68244a6deb28710274731e5063f30d7613986239651ec718520\"" Dec 13 14:28:25.060317 systemd[1]: Started cri-containerd-4ae0ffca7daec68244a6deb28710274731e5063f30d7613986239651ec718520.scope. Dec 13 14:28:25.074000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.074000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb0e5804d58 items=0 ppid=2210 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653066666361376461656336383234346136646562323837313032 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit: BPF prog-id=111 op=LOAD Dec 13 14:28:25.075000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000302eb8 items=0 ppid=2210 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653066666361376461656336383234346136646562323837313032 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit: BPF prog-id=112 op=LOAD Dec 13 14:28:25.075000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000302f08 items=0 ppid=2210 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653066666361376461656336383234346136646562323837313032 Dec 13 14:28:25.075000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:28:25.075000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:25.075000 audit: BPF prog-id=113 op=LOAD Dec 13 14:28:25.075000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000302f98 items=0 ppid=2210 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653066666361376461656336383234346136646562323837313032 Dec 13 14:28:25.089610 env[1212]: time="2024-12-13T14:28:25.089555367Z" level=info msg="StartContainer for \"4ae0ffca7daec68244a6deb28710274731e5063f30d7613986239651ec718520\" returns successfully" Dec 13 14:28:25.135000 audit[2304]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.135000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff757a6d00 a2=0 a3=7fff757a6cec items=0 ppid=2261 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.135000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:28:25.136000 audit[2305]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.136000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7e722870 a2=0 a3=7ffe7e72285c items=0 ppid=2261 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:28:25.138000 audit[2307]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.138000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc705b07a0 a2=0 a3=7ffc705b078c items=0 ppid=2261 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:28:25.138000 audit[2306]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.138000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee9793140 a2=0 a3=7ffee979312c items=0 ppid=2261 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:28:25.140000 audit[2308]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.140000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd12151f0 a2=0 a3=7ffdd12151dc items=0 ppid=2261 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:28:25.140000 audit[2309]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.140000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9c3d3030 a2=0 a3=7fff9c3d301c items=0 ppid=2261 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:28:25.237000 audit[2310]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.237000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffdf357610 a2=0 a3=7fffdf3575fc items=0 ppid=2261 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:28:25.240000 audit[2312]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.240000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffca46e1d80 a2=0 a3=7ffca46e1d6c items=0 ppid=2261 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:28:25.243000 audit[2315]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.243000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcfeff6c70 a2=0 a3=7ffcfeff6c5c items=0 ppid=2261 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:28:25.243000 audit[2316]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.243000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb8a5be30 a2=0 a3=7ffdb8a5be1c items=0 ppid=2261 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:28:25.245000 audit[2318]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.245000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff74d2fe80 a2=0 a3=7fff74d2fe6c items=0 ppid=2261 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:28:25.246000 audit[2319]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.246000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf1dab510 a2=0 a3=7ffcf1dab4fc items=0 ppid=2261 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:28:25.248000 audit[2321]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.248000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc35144e90 a2=0 a3=7ffc35144e7c items=0 ppid=2261 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:28:25.251000 audit[2324]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.251000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff7e1ab50 a2=0 a3=7ffff7e1ab3c items=0 ppid=2261 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:28:25.251000 audit[2325]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.251000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeec88f840 a2=0 a3=7ffeec88f82c items=0 ppid=2261 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:28:25.253000 audit[2327]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.253000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc93f0150 a2=0 a3=7ffcc93f013c items=0 ppid=2261 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:28:25.254000 audit[2328]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.254000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe05fb1d40 a2=0 a3=7ffe05fb1d2c items=0 ppid=2261 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:28:25.256000 audit[2330]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.256000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc7311670 a2=0 a3=7ffdc731165c items=0 ppid=2261 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:28:25.259000 audit[2333]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.259000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd623d4a10 a2=0 a3=7ffd623d49fc items=0 ppid=2261 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:28:25.262000 audit[2336]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.262000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffee314b60 a2=0 a3=7fffee314b4c items=0 ppid=2261 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:28:25.263000 audit[2337]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.263000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe713ea270 a2=0 a3=7ffe713ea25c items=0 ppid=2261 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:28:25.265000 audit[2339]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.265000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff8a5a48c0 a2=0 a3=7fff8a5a48ac items=0 ppid=2261 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:25.267000 audit[2342]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.267000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1a04dd60 a2=0 a3=7ffc1a04dd4c items=0 ppid=2261 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:25.268000 audit[2343]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.268000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2c66e9a0 a2=0 a3=7ffe2c66e98c items=0 ppid=2261 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:28:25.270000 audit[2345]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:25.270000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc3be46c90 a2=0 a3=7ffc3be46c7c items=0 ppid=2261 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:28:25.277017 kubelet[2056]: E1213 14:28:25.276988 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:25.291000 audit[2351]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:25.291000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc9bbf12d0 a2=0 a3=7ffc9bbf12bc items=0 ppid=2261 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:25.299000 audit[2351]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:25.299000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc9bbf12d0 a2=0 a3=7ffc9bbf12bc items=0 ppid=2261 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:25.300000 audit[2356]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.300000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff645535f0 a2=0 a3=7fff645535dc items=0 ppid=2261 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:28:25.302000 audit[2358]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.302000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff58f64ec0 a2=0 a3=7fff58f64eac items=0 ppid=2261 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:28:25.305000 audit[2361]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.305000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff8b8f1c60 a2=0 a3=7fff8b8f1c4c items=0 ppid=2261 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:28:25.306000 audit[2362]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.306000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd50ce8d70 a2=0 a3=7ffd50ce8d5c items=0 ppid=2261 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:28:25.307000 audit[2364]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.307000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe09744f20 a2=0 a3=7ffe09744f0c items=0 ppid=2261 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:28:25.308000 audit[2365]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.308000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3cfa8e00 a2=0 a3=7ffc3cfa8dec items=0 ppid=2261 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:28:25.311195 kubelet[2056]: E1213 14:28:25.311171 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:25.310000 audit[2367]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.310000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc04bd3210 a2=0 a3=7ffc04bd31fc items=0 ppid=2261 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:28:25.313000 audit[2370]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.313000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffe7ca7ed0 a2=0 a3=7fffe7ca7ebc items=0 ppid=2261 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:28:25.314000 audit[2371]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.314000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7130f370 a2=0 a3=7ffe7130f35c items=0 ppid=2261 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:28:25.316000 audit[2373]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.316000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8364aba0 a2=0 a3=7fff8364ab8c items=0 ppid=2261 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:28:25.317000 audit[2374]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.317000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd65153490 a2=0 a3=7ffd6515347c items=0 ppid=2261 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:28:25.319000 audit[2376]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.319000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5af48b70 a2=0 a3=7ffe5af48b5c items=0 ppid=2261 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:28:25.321000 audit[2379]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.321000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff042b270 a2=0 a3=7ffff042b25c items=0 ppid=2261 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:28:25.324000 audit[2382]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.324000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe98cc7450 a2=0 a3=7ffe98cc743c items=0 ppid=2261 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:28:25.325000 audit[2383]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.325000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffefc59f590 a2=0 a3=7ffefc59f57c items=0 ppid=2261 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:28:25.326000 audit[2385]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.326000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd2365e850 a2=0 a3=7ffd2365e83c items=0 ppid=2261 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:25.329000 audit[2388]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.329000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff0f050610 a2=0 a3=7fff0f0505fc items=0 ppid=2261 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:25.329000 audit[2389]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.329000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde1792290 a2=0 a3=7ffde179227c items=0 ppid=2261 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:28:25.331000 audit[2391]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.331000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc59c4d9d0 a2=0 a3=7ffc59c4d9bc items=0 ppid=2261 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:28:25.332000 audit[2392]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.332000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea9e2dff0 a2=0 a3=7ffea9e2dfdc items=0 ppid=2261 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:28:25.334000 audit[2394]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.334000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6b880120 a2=0 a3=7ffc6b88010c items=0 ppid=2261 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:25.336000 audit[2397]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:25.336000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff4a0f1400 a2=0 a3=7fff4a0f13ec items=0 ppid=2261 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:25.338000 audit[2399]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:28:25.338000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff3c8cd880 a2=0 a3=7fff3c8cd86c items=0 ppid=2261 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.338000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:25.338000 audit[2399]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:28:25.338000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff3c8cd880 a2=0 a3=7fff3c8cd86c items=0 ppid=2261 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.338000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:27.122827 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1869075963.mount: Deactivated successfully. Dec 13 14:28:27.943882 env[1212]: time="2024-12-13T14:28:27.943819210Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:27.946069 env[1212]: time="2024-12-13T14:28:27.946017890Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:27.947916 env[1212]: time="2024-12-13T14:28:27.947884306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:27.949424 env[1212]: time="2024-12-13T14:28:27.949395671Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:27.949937 env[1212]: time="2024-12-13T14:28:27.949904690Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:28:27.951701 env[1212]: time="2024-12-13T14:28:27.951677168Z" level=info msg="CreateContainer within sandbox \"2dc526825bfd3f825b9029b96e2af3a4b15fb93e93485c4eca659c8aeae19b16\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:28:27.964516 env[1212]: time="2024-12-13T14:28:27.964465570Z" level=info msg="CreateContainer within sandbox \"2dc526825bfd3f825b9029b96e2af3a4b15fb93e93485c4eca659c8aeae19b16\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"d637a0c56e6aa341606281488763557e6630391c5b4822a64d77c2e670d63a9e\"" Dec 13 14:28:27.965172 env[1212]: time="2024-12-13T14:28:27.965140771Z" level=info msg="StartContainer for \"d637a0c56e6aa341606281488763557e6630391c5b4822a64d77c2e670d63a9e\"" Dec 13 14:28:27.981109 systemd[1]: Started cri-containerd-d637a0c56e6aa341606281488763557e6630391c5b4822a64d77c2e670d63a9e.scope. Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit: BPF prog-id=114 op=LOAD Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2169 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:27.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333761306335366536616133343136303632383134383837363335 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2169 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:27.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333761306335366536616133343136303632383134383837363335 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.993000 audit: BPF prog-id=115 op=LOAD Dec 13 14:28:27.993000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f3dc0 items=0 ppid=2169 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:27.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333761306335366536616133343136303632383134383837363335 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit: BPF prog-id=116 op=LOAD Dec 13 14:28:27.994000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f3e08 items=0 ppid=2169 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:27.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333761306335366536616133343136303632383134383837363335 Dec 13 14:28:27.994000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:28:27.994000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:27.994000 audit: BPF prog-id=117 op=LOAD Dec 13 14:28:27.994000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c2218 items=0 ppid=2169 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:27.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333761306335366536616133343136303632383134383837363335 Dec 13 14:28:28.007885 env[1212]: time="2024-12-13T14:28:28.007829268Z" level=info msg="StartContainer for \"d637a0c56e6aa341606281488763557e6630391c5b4822a64d77c2e670d63a9e\" returns successfully" Dec 13 14:28:28.348972 kubelet[2056]: I1213 14:28:28.348920 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-dp74t" podStartSLOduration=4.348854154 podStartE2EDuration="4.348854154s" podCreationTimestamp="2024-12-13 14:28:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:28:25.390837832 +0000 UTC m=+14.180938711" watchObservedRunningTime="2024-12-13 14:28:28.348854154 +0000 UTC m=+17.138955053" Dec 13 14:28:30.965000 audit[2439]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:30.975821 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 14:28:30.975954 kernel: audit: type=1325 audit(1734100110.965:898): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:30.965000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff40798a20 a2=0 a3=7fff40798a0c items=0 ppid=2261 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:30.983802 kernel: audit: type=1300 audit(1734100110.965:898): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff40798a20 a2=0 a3=7fff40798a0c items=0 ppid=2261 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:30.983917 kernel: audit: type=1327 audit(1734100110.965:898): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:30.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:30.986000 audit[2439]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:30.986000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff40798a20 a2=0 a3=0 items=0 ppid=2261 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:30.995650 kernel: audit: type=1325 audit(1734100110.986:899): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:30.995707 kernel: audit: type=1300 audit(1734100110.986:899): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff40798a20 a2=0 a3=0 items=0 ppid=2261 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:30.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:30.998553 kernel: audit: type=1327 audit(1734100110.986:899): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:31.013000 audit[2441]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:31.017091 kernel: audit: type=1325 audit(1734100111.013:900): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:31.013000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffdf2e8a80 a2=0 a3=7fffdf2e8a6c items=0 ppid=2261 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.013000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:31.030617 kernel: audit: type=1300 audit(1734100111.013:900): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffdf2e8a80 a2=0 a3=7fffdf2e8a6c items=0 ppid=2261 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.030807 kernel: audit: type=1327 audit(1734100111.013:900): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:31.030831 kernel: audit: type=1325 audit(1734100111.023:901): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:31.023000 audit[2441]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:31.023000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffdf2e8a80 a2=0 a3=0 items=0 ppid=2261 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.023000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:31.223442 kubelet[2056]: I1213 14:28:31.222945 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-grv2b" podStartSLOduration=4.057503822 podStartE2EDuration="7.222876657s" podCreationTimestamp="2024-12-13 14:28:24 +0000 UTC" firstStartedPulling="2024-12-13 14:28:24.784997632 +0000 UTC m=+13.575098501" lastFinishedPulling="2024-12-13 14:28:27.950370457 +0000 UTC m=+16.740471336" observedRunningTime="2024-12-13 14:28:28.349665772 +0000 UTC m=+17.139766651" watchObservedRunningTime="2024-12-13 14:28:31.222876657 +0000 UTC m=+20.012977536" Dec 13 14:28:31.227647 kubelet[2056]: I1213 14:28:31.227024 2056 topology_manager.go:215] "Topology Admit Handler" podUID="095bc696-819e-4496-b8c6-b847ac076dbd" podNamespace="calico-system" podName="calico-typha-68c96747c4-m87sn" Dec 13 14:28:31.235571 systemd[1]: Created slice kubepods-besteffort-pod095bc696_819e_4496_b8c6_b847ac076dbd.slice. Dec 13 14:28:31.282456 kubelet[2056]: I1213 14:28:31.282416 2056 topology_manager.go:215] "Topology Admit Handler" podUID="fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c" podNamespace="calico-system" podName="calico-node-8rcr6" Dec 13 14:28:31.288690 systemd[1]: Created slice kubepods-besteffort-podfadf0b9c_4ce0_40b3_8528_bbfb48b0a35c.slice. Dec 13 14:28:31.310197 kubelet[2056]: I1213 14:28:31.310144 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-policysync\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310197 kubelet[2056]: I1213 14:28:31.310194 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-tigera-ca-bundle\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310197 kubelet[2056]: I1213 14:28:31.310214 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-var-run-calico\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310485 kubelet[2056]: I1213 14:28:31.310239 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-cni-log-dir\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310485 kubelet[2056]: I1213 14:28:31.310261 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-xtables-lock\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310485 kubelet[2056]: I1213 14:28:31.310281 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/095bc696-819e-4496-b8c6-b847ac076dbd-tigera-ca-bundle\") pod \"calico-typha-68c96747c4-m87sn\" (UID: \"095bc696-819e-4496-b8c6-b847ac076dbd\") " pod="calico-system/calico-typha-68c96747c4-m87sn" Dec 13 14:28:31.310485 kubelet[2056]: I1213 14:28:31.310300 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/095bc696-819e-4496-b8c6-b847ac076dbd-typha-certs\") pod \"calico-typha-68c96747c4-m87sn\" (UID: \"095bc696-819e-4496-b8c6-b847ac076dbd\") " pod="calico-system/calico-typha-68c96747c4-m87sn" Dec 13 14:28:31.310485 kubelet[2056]: I1213 14:28:31.310322 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-var-lib-calico\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310651 kubelet[2056]: I1213 14:28:31.310342 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-cni-net-dir\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310651 kubelet[2056]: I1213 14:28:31.310361 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-lib-modules\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310651 kubelet[2056]: I1213 14:28:31.310379 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jgvv6\" (UniqueName: \"kubernetes.io/projected/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-kube-api-access-jgvv6\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310651 kubelet[2056]: I1213 14:28:31.310403 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8f4n5\" (UniqueName: \"kubernetes.io/projected/095bc696-819e-4496-b8c6-b847ac076dbd-kube-api-access-8f4n5\") pod \"calico-typha-68c96747c4-m87sn\" (UID: \"095bc696-819e-4496-b8c6-b847ac076dbd\") " pod="calico-system/calico-typha-68c96747c4-m87sn" Dec 13 14:28:31.310651 kubelet[2056]: I1213 14:28:31.310422 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-node-certs\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310810 kubelet[2056]: I1213 14:28:31.310439 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-cni-bin-dir\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.310810 kubelet[2056]: I1213 14:28:31.310458 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c-flexvol-driver-host\") pod \"calico-node-8rcr6\" (UID: \"fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c\") " pod="calico-system/calico-node-8rcr6" Dec 13 14:28:31.413252 kubelet[2056]: E1213 14:28:31.413209 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.413252 kubelet[2056]: W1213 14:28:31.413243 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.413472 kubelet[2056]: E1213 14:28:31.413275 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.413472 kubelet[2056]: E1213 14:28:31.413447 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.413472 kubelet[2056]: W1213 14:28:31.413455 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.413472 kubelet[2056]: E1213 14:28:31.413476 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.413652 kubelet[2056]: E1213 14:28:31.413630 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.413652 kubelet[2056]: W1213 14:28:31.413643 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.413652 kubelet[2056]: E1213 14:28:31.413654 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.413807 kubelet[2056]: E1213 14:28:31.413781 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.413807 kubelet[2056]: W1213 14:28:31.413803 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.413889 kubelet[2056]: E1213 14:28:31.413815 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.415840 kubelet[2056]: E1213 14:28:31.415237 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.415840 kubelet[2056]: W1213 14:28:31.415250 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.415840 kubelet[2056]: E1213 14:28:31.415261 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.415840 kubelet[2056]: E1213 14:28:31.415384 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.415840 kubelet[2056]: W1213 14:28:31.415399 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.415840 kubelet[2056]: E1213 14:28:31.415409 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.415840 kubelet[2056]: E1213 14:28:31.415513 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.415840 kubelet[2056]: W1213 14:28:31.415519 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.415840 kubelet[2056]: E1213 14:28:31.415538 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.415840 kubelet[2056]: E1213 14:28:31.415640 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.416326 kubelet[2056]: W1213 14:28:31.415645 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.416326 kubelet[2056]: E1213 14:28:31.415672 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.416326 kubelet[2056]: E1213 14:28:31.415825 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.416326 kubelet[2056]: W1213 14:28:31.415841 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.416326 kubelet[2056]: E1213 14:28:31.415855 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.416326 kubelet[2056]: E1213 14:28:31.416011 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.416326 kubelet[2056]: W1213 14:28:31.416021 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.416326 kubelet[2056]: E1213 14:28:31.416047 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.416326 kubelet[2056]: E1213 14:28:31.416217 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.416326 kubelet[2056]: W1213 14:28:31.416233 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.416633 kubelet[2056]: E1213 14:28:31.416250 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.416633 kubelet[2056]: E1213 14:28:31.416351 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.416633 kubelet[2056]: W1213 14:28:31.416357 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.416633 kubelet[2056]: E1213 14:28:31.416379 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.416633 kubelet[2056]: E1213 14:28:31.416519 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.416633 kubelet[2056]: W1213 14:28:31.416534 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.416633 kubelet[2056]: E1213 14:28:31.416543 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.417273 kubelet[2056]: E1213 14:28:31.417227 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.417273 kubelet[2056]: W1213 14:28:31.417243 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.417273 kubelet[2056]: E1213 14:28:31.417262 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.422996 kubelet[2056]: E1213 14:28:31.420474 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.422996 kubelet[2056]: W1213 14:28:31.420490 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.422996 kubelet[2056]: E1213 14:28:31.420507 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.495377 kubelet[2056]: E1213 14:28:31.494965 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.495377 kubelet[2056]: W1213 14:28:31.494983 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.495377 kubelet[2056]: E1213 14:28:31.495004 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.497889 kubelet[2056]: E1213 14:28:31.497784 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.497889 kubelet[2056]: W1213 14:28:31.497808 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.497889 kubelet[2056]: E1213 14:28:31.497832 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.539737 kubelet[2056]: E1213 14:28:31.539697 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:31.540411 env[1212]: time="2024-12-13T14:28:31.540363131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68c96747c4-m87sn,Uid:095bc696-819e-4496-b8c6-b847ac076dbd,Namespace:calico-system,Attempt:0,}" Dec 13 14:28:31.592773 kubelet[2056]: E1213 14:28:31.592723 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:31.593255 env[1212]: time="2024-12-13T14:28:31.593220506Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8rcr6,Uid:fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c,Namespace:calico-system,Attempt:0,}" Dec 13 14:28:31.638627 kubelet[2056]: I1213 14:28:31.638583 2056 topology_manager.go:215] "Topology Admit Handler" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" podNamespace="calico-system" podName="csi-node-driver-xj7z9" Dec 13 14:28:31.639161 kubelet[2056]: E1213 14:28:31.639148 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:31.704298 kubelet[2056]: E1213 14:28:31.704252 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.704298 kubelet[2056]: W1213 14:28:31.704285 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.704298 kubelet[2056]: E1213 14:28:31.704315 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.704578 kubelet[2056]: E1213 14:28:31.704514 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.704578 kubelet[2056]: W1213 14:28:31.704527 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.704578 kubelet[2056]: E1213 14:28:31.704544 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.704670 env[1212]: time="2024-12-13T14:28:31.704247971Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:31.704670 env[1212]: time="2024-12-13T14:28:31.704298746Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:31.704670 env[1212]: time="2024-12-13T14:28:31.704311340Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:31.704670 env[1212]: time="2024-12-13T14:28:31.704522418Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5daab3589a58bfd02cff08e815165a7052059630160ad9a943a4b05b2e595ea0 pid=2471 runtime=io.containerd.runc.v2 Dec 13 14:28:31.704772 kubelet[2056]: E1213 14:28:31.704751 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.704772 kubelet[2056]: W1213 14:28:31.704761 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.704937 kubelet[2056]: E1213 14:28:31.704776 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.705127 kubelet[2056]: E1213 14:28:31.705101 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.705127 kubelet[2056]: W1213 14:28:31.705119 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.705218 kubelet[2056]: E1213 14:28:31.705138 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.705333 kubelet[2056]: E1213 14:28:31.705308 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.705333 kubelet[2056]: W1213 14:28:31.705328 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.705416 kubelet[2056]: E1213 14:28:31.705342 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.705537 kubelet[2056]: E1213 14:28:31.705509 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.705537 kubelet[2056]: W1213 14:28:31.705526 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.705537 kubelet[2056]: E1213 14:28:31.705538 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.705717 kubelet[2056]: E1213 14:28:31.705690 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.705717 kubelet[2056]: W1213 14:28:31.705707 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.705717 kubelet[2056]: E1213 14:28:31.705719 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.709097 kubelet[2056]: E1213 14:28:31.705931 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.709097 kubelet[2056]: W1213 14:28:31.705946 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.709097 kubelet[2056]: E1213 14:28:31.705956 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.709097 kubelet[2056]: E1213 14:28:31.706932 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.709097 kubelet[2056]: W1213 14:28:31.706941 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.709097 kubelet[2056]: E1213 14:28:31.706951 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.709097 kubelet[2056]: E1213 14:28:31.707131 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.709097 kubelet[2056]: W1213 14:28:31.707139 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.709097 kubelet[2056]: E1213 14:28:31.707152 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.709647 kubelet[2056]: E1213 14:28:31.709623 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.709647 kubelet[2056]: W1213 14:28:31.709641 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.709729 kubelet[2056]: E1213 14:28:31.709664 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.718943 kubelet[2056]: E1213 14:28:31.718851 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.718943 kubelet[2056]: W1213 14:28:31.718874 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730040 kubelet[2056]: E1213 14:28:31.721312 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730040 kubelet[2056]: E1213 14:28:31.721671 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730040 kubelet[2056]: W1213 14:28:31.721685 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730040 kubelet[2056]: E1213 14:28:31.721706 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730040 kubelet[2056]: E1213 14:28:31.721820 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730040 kubelet[2056]: W1213 14:28:31.721828 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730040 kubelet[2056]: E1213 14:28:31.721840 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730040 kubelet[2056]: E1213 14:28:31.721972 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730040 kubelet[2056]: W1213 14:28:31.721980 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730040 kubelet[2056]: E1213 14:28:31.722036 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730311 env[1212]: time="2024-12-13T14:28:31.726171076Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:31.730311 env[1212]: time="2024-12-13T14:28:31.726241650Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:31.730311 env[1212]: time="2024-12-13T14:28:31.726262889Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:31.730311 env[1212]: time="2024-12-13T14:28:31.726424083Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/56351ecf54cc469bc4092e4b5da328dd866110fe07100c9eda67008baa8b5938 pid=2506 runtime=io.containerd.runc.v2 Dec 13 14:28:31.720303 systemd[1]: Started cri-containerd-5daab3589a58bfd02cff08e815165a7052059630160ad9a943a4b05b2e595ea0.scope. Dec 13 14:28:31.730495 kubelet[2056]: E1213 14:28:31.722276 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730495 kubelet[2056]: W1213 14:28:31.722283 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730495 kubelet[2056]: E1213 14:28:31.722294 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730495 kubelet[2056]: E1213 14:28:31.722453 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730495 kubelet[2056]: W1213 14:28:31.722459 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730495 kubelet[2056]: E1213 14:28:31.722469 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730495 kubelet[2056]: E1213 14:28:31.722567 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730495 kubelet[2056]: W1213 14:28:31.722573 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730495 kubelet[2056]: E1213 14:28:31.722582 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730495 kubelet[2056]: E1213 14:28:31.722685 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730755 kubelet[2056]: W1213 14:28:31.722690 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730755 kubelet[2056]: E1213 14:28:31.722699 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730755 kubelet[2056]: E1213 14:28:31.722794 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730755 kubelet[2056]: W1213 14:28:31.722800 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730755 kubelet[2056]: E1213 14:28:31.722808 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730755 kubelet[2056]: E1213 14:28:31.723139 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730755 kubelet[2056]: W1213 14:28:31.723146 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730755 kubelet[2056]: E1213 14:28:31.723155 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730755 kubelet[2056]: I1213 14:28:31.723178 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3f58d04b-d594-4e8a-bd4a-0d935f5eb68e-kubelet-dir\") pod \"csi-node-driver-xj7z9\" (UID: \"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e\") " pod="calico-system/csi-node-driver-xj7z9" Dec 13 14:28:31.730974 kubelet[2056]: E1213 14:28:31.723298 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730974 kubelet[2056]: W1213 14:28:31.723307 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730974 kubelet[2056]: E1213 14:28:31.723316 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730974 kubelet[2056]: I1213 14:28:31.723331 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3f58d04b-d594-4e8a-bd4a-0d935f5eb68e-socket-dir\") pod \"csi-node-driver-xj7z9\" (UID: \"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e\") " pod="calico-system/csi-node-driver-xj7z9" Dec 13 14:28:31.730974 kubelet[2056]: E1213 14:28:31.723462 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.730974 kubelet[2056]: W1213 14:28:31.723468 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.730974 kubelet[2056]: E1213 14:28:31.723477 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.730974 kubelet[2056]: I1213 14:28:31.723492 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3f58d04b-d594-4e8a-bd4a-0d935f5eb68e-registration-dir\") pod \"csi-node-driver-xj7z9\" (UID: \"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e\") " pod="calico-system/csi-node-driver-xj7z9" Dec 13 14:28:31.730974 kubelet[2056]: E1213 14:28:31.723680 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.731276 kubelet[2056]: W1213 14:28:31.723688 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.731276 kubelet[2056]: E1213 14:28:31.723701 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.731276 kubelet[2056]: I1213 14:28:31.723715 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sbqgv\" (UniqueName: \"kubernetes.io/projected/3f58d04b-d594-4e8a-bd4a-0d935f5eb68e-kube-api-access-sbqgv\") pod \"csi-node-driver-xj7z9\" (UID: \"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e\") " pod="calico-system/csi-node-driver-xj7z9" Dec 13 14:28:31.731276 kubelet[2056]: E1213 14:28:31.723861 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.731276 kubelet[2056]: W1213 14:28:31.723868 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.731276 kubelet[2056]: E1213 14:28:31.723878 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.731276 kubelet[2056]: I1213 14:28:31.723894 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3f58d04b-d594-4e8a-bd4a-0d935f5eb68e-varrun\") pod \"csi-node-driver-xj7z9\" (UID: \"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e\") " pod="calico-system/csi-node-driver-xj7z9" Dec 13 14:28:31.731276 kubelet[2056]: E1213 14:28:31.724037 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.731464 kubelet[2056]: W1213 14:28:31.724044 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.731464 kubelet[2056]: E1213 14:28:31.724065 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.731464 kubelet[2056]: E1213 14:28:31.724180 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.731464 kubelet[2056]: W1213 14:28:31.724185 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.731464 kubelet[2056]: E1213 14:28:31.724194 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.732348 kubelet[2056]: E1213 14:28:31.732311 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.732348 kubelet[2056]: W1213 14:28:31.732344 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.732455 kubelet[2056]: E1213 14:28:31.732383 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.733439 kubelet[2056]: E1213 14:28:31.732565 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.733439 kubelet[2056]: W1213 14:28:31.732578 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.733439 kubelet[2056]: E1213 14:28:31.732587 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.733439 kubelet[2056]: E1213 14:28:31.732739 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.733439 kubelet[2056]: W1213 14:28:31.732745 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.733439 kubelet[2056]: E1213 14:28:31.732754 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.733439 kubelet[2056]: E1213 14:28:31.732864 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.733439 kubelet[2056]: W1213 14:28:31.732871 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.733439 kubelet[2056]: E1213 14:28:31.732879 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.733439 kubelet[2056]: E1213 14:28:31.732989 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.733685 kubelet[2056]: W1213 14:28:31.732995 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.733685 kubelet[2056]: E1213 14:28:31.733004 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.733685 kubelet[2056]: E1213 14:28:31.733196 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.733685 kubelet[2056]: W1213 14:28:31.733204 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.733685 kubelet[2056]: E1213 14:28:31.733284 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.733685 kubelet[2056]: E1213 14:28:31.733366 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.733685 kubelet[2056]: W1213 14:28:31.733372 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.733685 kubelet[2056]: E1213 14:28:31.733380 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.733685 kubelet[2056]: E1213 14:28:31.733478 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.733685 kubelet[2056]: W1213 14:28:31.733484 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.733898 kubelet[2056]: E1213 14:28:31.733493 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.743170 systemd[1]: Started cri-containerd-56351ecf54cc469bc4092e4b5da328dd866110fe07100c9eda67008baa8b5938.scope. Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.768000 audit: BPF prog-id=118 op=LOAD Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2471 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564616162333538396135386266643032636666303865383135313635 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2471 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564616162333538396135386266643032636666303865383135313635 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit: BPF prog-id=119 op=LOAD Dec 13 14:28:31.769000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098830 items=0 ppid=2471 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564616162333538396135386266643032636666303865383135313635 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit: BPF prog-id=120 op=LOAD Dec 13 14:28:31.769000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098878 items=0 ppid=2471 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564616162333538396135386266643032636666303865383135313635 Dec 13 14:28:31.769000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:28:31.769000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.769000 audit: BPF prog-id=121 op=LOAD Dec 13 14:28:31.769000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098c88 items=0 ppid=2471 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564616162333538396135386266643032636666303865383135313635 Dec 13 14:28:31.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.785000 audit: BPF prog-id=122 op=LOAD Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2506 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333531656366353463633436396263343039326534623564613332 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2506 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333531656366353463633436396263343039326534623564613332 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit: BPF prog-id=123 op=LOAD Dec 13 14:28:31.786000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000314a10 items=0 ppid=2506 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333531656366353463633436396263343039326534623564613332 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit: BPF prog-id=124 op=LOAD Dec 13 14:28:31.786000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000314a58 items=0 ppid=2506 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333531656366353463633436396263343039326534623564613332 Dec 13 14:28:31.786000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:28:31.786000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.786000 audit: BPF prog-id=125 op=LOAD Dec 13 14:28:31.786000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000314e68 items=0 ppid=2506 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333531656366353463633436396263343039326534623564613332 Dec 13 14:28:31.804307 env[1212]: time="2024-12-13T14:28:31.804234083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8rcr6,Uid:fadf0b9c-4ce0-40b3-8528-bbfb48b0a35c,Namespace:calico-system,Attempt:0,} returns sandbox id \"56351ecf54cc469bc4092e4b5da328dd866110fe07100c9eda67008baa8b5938\"" Dec 13 14:28:31.805067 kubelet[2056]: E1213 14:28:31.804990 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:31.806313 env[1212]: time="2024-12-13T14:28:31.806264623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:28:31.820249 env[1212]: time="2024-12-13T14:28:31.819622554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68c96747c4-m87sn,Uid:095bc696-819e-4496-b8c6-b847ac076dbd,Namespace:calico-system,Attempt:0,} returns sandbox id \"5daab3589a58bfd02cff08e815165a7052059630160ad9a943a4b05b2e595ea0\"" Dec 13 14:28:31.821381 kubelet[2056]: E1213 14:28:31.821305 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:31.824347 kubelet[2056]: E1213 14:28:31.824328 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.824563 kubelet[2056]: W1213 14:28:31.824532 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.824689 kubelet[2056]: E1213 14:28:31.824675 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.825035 kubelet[2056]: E1213 14:28:31.825014 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.825150 kubelet[2056]: W1213 14:28:31.825133 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.825278 kubelet[2056]: E1213 14:28:31.825263 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.825636 kubelet[2056]: E1213 14:28:31.825613 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.825636 kubelet[2056]: W1213 14:28:31.825633 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.825743 kubelet[2056]: E1213 14:28:31.825658 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.825884 kubelet[2056]: E1213 14:28:31.825859 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.825884 kubelet[2056]: W1213 14:28:31.825875 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.825884 kubelet[2056]: E1213 14:28:31.825886 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.826069 kubelet[2056]: E1213 14:28:31.826021 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.826069 kubelet[2056]: W1213 14:28:31.826045 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.826069 kubelet[2056]: E1213 14:28:31.826065 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.826269 kubelet[2056]: E1213 14:28:31.826253 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.826269 kubelet[2056]: W1213 14:28:31.826264 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.826269 kubelet[2056]: E1213 14:28:31.826280 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.826726 kubelet[2056]: E1213 14:28:31.826699 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.826828 kubelet[2056]: W1213 14:28:31.826809 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.826950 kubelet[2056]: E1213 14:28:31.826934 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.828580 kubelet[2056]: E1213 14:28:31.827871 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.828580 kubelet[2056]: W1213 14:28:31.827882 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.828580 kubelet[2056]: E1213 14:28:31.827898 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.828580 kubelet[2056]: E1213 14:28:31.828251 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.828580 kubelet[2056]: W1213 14:28:31.828260 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.828580 kubelet[2056]: E1213 14:28:31.828275 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.828580 kubelet[2056]: E1213 14:28:31.828408 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.828580 kubelet[2056]: W1213 14:28:31.828415 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.828580 kubelet[2056]: E1213 14:28:31.828425 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.828580 kubelet[2056]: E1213 14:28:31.828560 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.828975 kubelet[2056]: W1213 14:28:31.828565 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.828975 kubelet[2056]: E1213 14:28:31.828574 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.828975 kubelet[2056]: E1213 14:28:31.828838 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.828975 kubelet[2056]: W1213 14:28:31.828844 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.828975 kubelet[2056]: E1213 14:28:31.828854 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.830211 kubelet[2056]: E1213 14:28:31.830193 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.830305 kubelet[2056]: W1213 14:28:31.830286 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.830507 kubelet[2056]: E1213 14:28:31.830490 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.830835 kubelet[2056]: E1213 14:28:31.830823 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.830941 kubelet[2056]: W1213 14:28:31.830914 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.831133 kubelet[2056]: E1213 14:28:31.831120 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.831271 kubelet[2056]: E1213 14:28:31.831259 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.831360 kubelet[2056]: W1213 14:28:31.831344 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.831536 kubelet[2056]: E1213 14:28:31.831514 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.831665 kubelet[2056]: E1213 14:28:31.831653 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.831773 kubelet[2056]: W1213 14:28:31.831755 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.831872 kubelet[2056]: E1213 14:28:31.831855 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.832258 kubelet[2056]: E1213 14:28:31.832246 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.832355 kubelet[2056]: W1213 14:28:31.832337 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.832450 kubelet[2056]: E1213 14:28:31.832436 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.832703 kubelet[2056]: E1213 14:28:31.832690 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.832799 kubelet[2056]: W1213 14:28:31.832783 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.832892 kubelet[2056]: E1213 14:28:31.832877 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.833219 kubelet[2056]: E1213 14:28:31.833207 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.833313 kubelet[2056]: W1213 14:28:31.833296 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.834011 kubelet[2056]: E1213 14:28:31.833997 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.834250 kubelet[2056]: E1213 14:28:31.834238 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.834343 kubelet[2056]: W1213 14:28:31.834326 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.834451 kubelet[2056]: E1213 14:28:31.834435 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.834845 kubelet[2056]: E1213 14:28:31.834814 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.834901 kubelet[2056]: W1213 14:28:31.834842 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.834901 kubelet[2056]: E1213 14:28:31.834877 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.835215 kubelet[2056]: E1213 14:28:31.835197 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.835215 kubelet[2056]: W1213 14:28:31.835208 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.835314 kubelet[2056]: E1213 14:28:31.835227 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.835429 kubelet[2056]: E1213 14:28:31.835415 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.835429 kubelet[2056]: W1213 14:28:31.835425 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.835512 kubelet[2056]: E1213 14:28:31.835444 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.835788 kubelet[2056]: E1213 14:28:31.835775 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.835888 kubelet[2056]: W1213 14:28:31.835867 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.835984 kubelet[2056]: E1213 14:28:31.835968 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.836972 kubelet[2056]: E1213 14:28:31.836960 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.837158 kubelet[2056]: W1213 14:28:31.837141 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.837259 kubelet[2056]: E1213 14:28:31.837243 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:31.907511 kubelet[2056]: E1213 14:28:31.907462 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:31.907511 kubelet[2056]: W1213 14:28:31.907492 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:31.907511 kubelet[2056]: E1213 14:28:31.907518 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:32.038000 audit[2605]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2605 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:32.038000 audit[2605]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffcb6792c10 a2=0 a3=7ffcb6792bfc items=0 ppid=2261 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:32.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:32.042000 audit[2605]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2605 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:32.042000 audit[2605]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb6792c10 a2=0 a3=0 items=0 ppid=2261 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:32.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:33.280176 kubelet[2056]: E1213 14:28:33.280129 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:33.520149 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1148473576.mount: Deactivated successfully. Dec 13 14:28:33.664587 env[1212]: time="2024-12-13T14:28:33.664450729Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:33.667023 env[1212]: time="2024-12-13T14:28:33.666971039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:33.669512 env[1212]: time="2024-12-13T14:28:33.669441194Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:33.671139 env[1212]: time="2024-12-13T14:28:33.671102068Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:33.671604 env[1212]: time="2024-12-13T14:28:33.671569417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:28:33.672231 env[1212]: time="2024-12-13T14:28:33.672110755Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:28:33.673504 env[1212]: time="2024-12-13T14:28:33.673470562Z" level=info msg="CreateContainer within sandbox \"56351ecf54cc469bc4092e4b5da328dd866110fe07100c9eda67008baa8b5938\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:28:33.689685 env[1212]: time="2024-12-13T14:28:33.689630193Z" level=info msg="CreateContainer within sandbox \"56351ecf54cc469bc4092e4b5da328dd866110fe07100c9eda67008baa8b5938\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3955af54a0d4d569cc9964966a9e829b2efb515d07faee0cf71a3e744b750025\"" Dec 13 14:28:33.690571 env[1212]: time="2024-12-13T14:28:33.690512272Z" level=info msg="StartContainer for \"3955af54a0d4d569cc9964966a9e829b2efb515d07faee0cf71a3e744b750025\"" Dec 13 14:28:33.710199 systemd[1]: Started cri-containerd-3955af54a0d4d569cc9964966a9e829b2efb515d07faee0cf71a3e744b750025.scope. Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3f79415b48 items=0 ppid=2506 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:33.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339353561663534613064346435363963633939363439363661396538 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit: BPF prog-id=126 op=LOAD Dec 13 14:28:33.727000 audit[2613]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a94f8 items=0 ppid=2506 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:33.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339353561663534613064346435363963633939363439363661396538 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.727000 audit: BPF prog-id=127 op=LOAD Dec 13 14:28:33.727000 audit[2613]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a9548 items=0 ppid=2506 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:33.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339353561663534613064346435363963633939363439363661396538 Dec 13 14:28:33.728000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:28:33.728000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:33.728000 audit: BPF prog-id=128 op=LOAD Dec 13 14:28:33.728000 audit[2613]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a95d8 items=0 ppid=2506 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:33.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339353561663534613064346435363963633939363439363661396538 Dec 13 14:28:33.756299 systemd[1]: cri-containerd-3955af54a0d4d569cc9964966a9e829b2efb515d07faee0cf71a3e744b750025.scope: Deactivated successfully. Dec 13 14:28:33.764000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:28:33.779490 env[1212]: time="2024-12-13T14:28:33.779412573Z" level=info msg="StartContainer for \"3955af54a0d4d569cc9964966a9e829b2efb515d07faee0cf71a3e744b750025\" returns successfully" Dec 13 14:28:33.818147 env[1212]: time="2024-12-13T14:28:33.818046229Z" level=info msg="shim disconnected" id=3955af54a0d4d569cc9964966a9e829b2efb515d07faee0cf71a3e744b750025 Dec 13 14:28:33.818147 env[1212]: time="2024-12-13T14:28:33.818145425Z" level=warning msg="cleaning up after shim disconnected" id=3955af54a0d4d569cc9964966a9e829b2efb515d07faee0cf71a3e744b750025 namespace=k8s.io Dec 13 14:28:33.818403 env[1212]: time="2024-12-13T14:28:33.818161375Z" level=info msg="cleaning up dead shim" Dec 13 14:28:33.824903 env[1212]: time="2024-12-13T14:28:33.824830829Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:28:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2653 runtime=io.containerd.runc.v2\n" Dec 13 14:28:34.334754 kubelet[2056]: E1213 14:28:34.334715 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:34.474920 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3955af54a0d4d569cc9964966a9e829b2efb515d07faee0cf71a3e744b750025-rootfs.mount: Deactivated successfully. Dec 13 14:28:35.281193 kubelet[2056]: E1213 14:28:35.281143 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:37.280454 kubelet[2056]: E1213 14:28:37.280398 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:37.408364 env[1212]: time="2024-12-13T14:28:37.408286456Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:37.410467 env[1212]: time="2024-12-13T14:28:37.410402623Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:37.412712 env[1212]: time="2024-12-13T14:28:37.412663973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:37.414600 env[1212]: time="2024-12-13T14:28:37.414559546Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:37.415344 env[1212]: time="2024-12-13T14:28:37.415271875Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:28:37.416132 env[1212]: time="2024-12-13T14:28:37.416092387Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:28:37.427007 env[1212]: time="2024-12-13T14:28:37.426912843Z" level=info msg="CreateContainer within sandbox \"5daab3589a58bfd02cff08e815165a7052059630160ad9a943a4b05b2e595ea0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:28:37.444363 env[1212]: time="2024-12-13T14:28:37.444297748Z" level=info msg="CreateContainer within sandbox \"5daab3589a58bfd02cff08e815165a7052059630160ad9a943a4b05b2e595ea0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0e98194a971a07ea4557e3a420a8d4976b1d402891d7e07a2f18f4d9f05176e8\"" Dec 13 14:28:37.445075 env[1212]: time="2024-12-13T14:28:37.445022690Z" level=info msg="StartContainer for \"0e98194a971a07ea4557e3a420a8d4976b1d402891d7e07a2f18f4d9f05176e8\"" Dec 13 14:28:37.461477 systemd[1]: Started cri-containerd-0e98194a971a07ea4557e3a420a8d4976b1d402891d7e07a2f18f4d9f05176e8.scope. Dec 13 14:28:37.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.480395 kernel: kauditd_printk_skb: 166 callbacks suppressed Dec 13 14:28:37.480459 kernel: audit: type=1400 audit(1734100117.477:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.488023 kernel: audit: type=1400 audit(1734100117.478:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.496317 kernel: audit: type=1400 audit(1734100117.478:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.496466 kernel: audit: type=1400 audit(1734100117.478:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.499997 kernel: audit: type=1400 audit(1734100117.478:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.507141 kernel: audit: type=1400 audit(1734100117.478:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.507208 kernel: audit: type=1400 audit(1734100117.478:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.507239 kernel: audit: type=1400 audit(1734100117.478:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.514423 kernel: audit: type=1400 audit(1734100117.478:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.514602 kernel: audit: type=1400 audit(1734100117.482:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.482000 audit: BPF prog-id=129 op=LOAD Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2471 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:37.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393831393461393731613037656134353537653361343230613864 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2471 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:37.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393831393461393731613037656134353537653361343230613864 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.483000 audit: BPF prog-id=130 op=LOAD Dec 13 14:28:37.483000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000308540 items=0 ppid=2471 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:37.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393831393461393731613037656134353537653361343230613864 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit: BPF prog-id=131 op=LOAD Dec 13 14:28:37.487000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000308588 items=0 ppid=2471 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:37.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393831393461393731613037656134353537653361343230613864 Dec 13 14:28:37.487000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:28:37.487000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:37.487000 audit: BPF prog-id=132 op=LOAD Dec 13 14:28:37.487000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000308998 items=0 ppid=2471 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:37.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065393831393461393731613037656134353537653361343230613864 Dec 13 14:28:37.534980 env[1212]: time="2024-12-13T14:28:37.534811853Z" level=info msg="StartContainer for \"0e98194a971a07ea4557e3a420a8d4976b1d402891d7e07a2f18f4d9f05176e8\" returns successfully" Dec 13 14:28:38.353686 kubelet[2056]: E1213 14:28:38.353642 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:38.363663 kubelet[2056]: I1213 14:28:38.363604 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-68c96747c4-m87sn" podStartSLOduration=1.7697003470000001 podStartE2EDuration="7.363551272s" podCreationTimestamp="2024-12-13 14:28:31 +0000 UTC" firstStartedPulling="2024-12-13 14:28:31.82187364 +0000 UTC m=+20.611974519" lastFinishedPulling="2024-12-13 14:28:37.415724565 +0000 UTC m=+26.205825444" observedRunningTime="2024-12-13 14:28:38.363238294 +0000 UTC m=+27.153339183" watchObservedRunningTime="2024-12-13 14:28:38.363551272 +0000 UTC m=+27.153652151" Dec 13 14:28:38.383000 audit[2714]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.383000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff4bea4a10 a2=0 a3=7fff4bea49fc items=0 ppid=2261 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:38.388000 audit[2714]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.388000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff4bea4a10 a2=0 a3=7fff4bea49fc items=0 ppid=2261 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:39.280161 kubelet[2056]: E1213 14:28:39.280127 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:39.355851 kubelet[2056]: E1213 14:28:39.355809 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:40.357110 kubelet[2056]: E1213 14:28:40.357074 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:41.279888 kubelet[2056]: E1213 14:28:41.279815 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:43.278712 env[1212]: time="2024-12-13T14:28:43.278622846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:43.279888 kubelet[2056]: E1213 14:28:43.279849 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:43.281961 env[1212]: time="2024-12-13T14:28:43.281912795Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:43.283691 env[1212]: time="2024-12-13T14:28:43.283640570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:43.285411 env[1212]: time="2024-12-13T14:28:43.285365018Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:43.285950 env[1212]: time="2024-12-13T14:28:43.285886919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:28:43.288124 env[1212]: time="2024-12-13T14:28:43.288073686Z" level=info msg="CreateContainer within sandbox \"56351ecf54cc469bc4092e4b5da328dd866110fe07100c9eda67008baa8b5938\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:28:43.305675 env[1212]: time="2024-12-13T14:28:43.305599672Z" level=info msg="CreateContainer within sandbox \"56351ecf54cc469bc4092e4b5da328dd866110fe07100c9eda67008baa8b5938\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e180fbaf6744be99a4cc7de153425c3aea36d9627039fd10252eb0e4e5f8fe39\"" Dec 13 14:28:43.306311 env[1212]: time="2024-12-13T14:28:43.306275400Z" level=info msg="StartContainer for \"e180fbaf6744be99a4cc7de153425c3aea36d9627039fd10252eb0e4e5f8fe39\"" Dec 13 14:28:43.329289 systemd[1]: Started cri-containerd-e180fbaf6744be99a4cc7de153425c3aea36d9627039fd10252eb0e4e5f8fe39.scope. Dec 13 14:28:43.366183 kernel: kauditd_printk_skb: 53 callbacks suppressed Dec 13 14:28:43.366384 kernel: audit: type=1400 audit(1734100123.360:967): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdf3848f4d8 items=0 ppid=2506 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.374095 kernel: audit: type=1300 audit(1734100123.360:967): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdf3848f4d8 items=0 ppid=2506 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.374206 kernel: audit: type=1327 audit(1734100123.360:967): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383066626166363734346265393961346363376465313533343235 Dec 13 14:28:43.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383066626166363734346265393961346363376465313533343235 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.382832 kernel: audit: type=1400 audit(1734100123.360:968): avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.382881 kernel: audit: type=1400 audit(1734100123.360:968): avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.390279 kernel: audit: type=1400 audit(1734100123.360:968): avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.390354 kernel: audit: type=1400 audit(1734100123.360:968): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.397069 kernel: audit: type=1400 audit(1734100123.360:968): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.397143 kernel: audit: type=1400 audit(1734100123.360:968): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.400033 kernel: audit: type=1400 audit(1734100123.360:968): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.360000 audit: BPF prog-id=133 op=LOAD Dec 13 14:28:43.360000 audit[2724]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000298b28 items=0 ppid=2506 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383066626166363734346265393961346363376465313533343235 Dec 13 14:28:43.368000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.368000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.368000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.368000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.368000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.368000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.368000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.368000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.368000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.368000 audit: BPF prog-id=134 op=LOAD Dec 13 14:28:43.368000 audit[2724]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000298b78 items=0 ppid=2506 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383066626166363734346265393961346363376465313533343235 Dec 13 14:28:43.374000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:28:43.374000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.374000 audit: BPF prog-id=135 op=LOAD Dec 13 14:28:43.374000 audit[2724]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000298c08 items=0 ppid=2506 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383066626166363734346265393961346363376465313533343235 Dec 13 14:28:43.564417 env[1212]: time="2024-12-13T14:28:43.564262665Z" level=info msg="StartContainer for \"e180fbaf6744be99a4cc7de153425c3aea36d9627039fd10252eb0e4e5f8fe39\" returns successfully" Dec 13 14:28:43.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.115:22-10.0.0.1:55040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:43.983475 systemd[1]: Started sshd@7-10.0.0.115:22-10.0.0.1:55040.service. Dec 13 14:28:44.033000 audit[2753]: USER_ACCT pid=2753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:44.033707 sshd[2753]: Accepted publickey for core from 10.0.0.1 port 55040 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:44.034000 audit[2753]: CRED_ACQ pid=2753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:44.034000 audit[2753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe112b13e0 a2=3 a3=0 items=0 ppid=1 pid=2753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:44.034000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:44.034634 sshd[2753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:44.040086 systemd[1]: Started session-8.scope. Dec 13 14:28:44.040662 systemd-logind[1203]: New session 8 of user core. Dec 13 14:28:44.045000 audit[2753]: USER_START pid=2753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:44.047000 audit[2756]: CRED_ACQ pid=2756 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:44.373754 kubelet[2056]: E1213 14:28:44.373724 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:44.716141 sshd[2753]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:44.717000 audit[2753]: USER_END pid=2753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:44.717000 audit[2753]: CRED_DISP pid=2753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:44.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.115:22-10.0.0.1:55040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:44.719590 systemd[1]: sshd@7-10.0.0.115:22-10.0.0.1:55040.service: Deactivated successfully. Dec 13 14:28:44.720496 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:28:44.721125 systemd-logind[1203]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:28:44.721944 systemd-logind[1203]: Removed session 8. Dec 13 14:28:45.269120 env[1212]: time="2024-12-13T14:28:45.269039942Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:28:45.271176 systemd[1]: cri-containerd-e180fbaf6744be99a4cc7de153425c3aea36d9627039fd10252eb0e4e5f8fe39.scope: Deactivated successfully. Dec 13 14:28:45.278000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:28:45.280432 kubelet[2056]: E1213 14:28:45.280394 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:45.288555 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e180fbaf6744be99a4cc7de153425c3aea36d9627039fd10252eb0e4e5f8fe39-rootfs.mount: Deactivated successfully. Dec 13 14:28:45.364187 kubelet[2056]: I1213 14:28:45.364151 2056 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:28:45.375945 kubelet[2056]: E1213 14:28:45.375910 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:45.566024 kubelet[2056]: I1213 14:28:45.565979 2056 topology_manager.go:215] "Topology Admit Handler" podUID="cc5c46ef-a360-454e-99a7-a2960943388e" podNamespace="calico-apiserver" podName="calico-apiserver-5b476db8c-kglgd" Dec 13 14:28:45.628067 systemd[1]: Created slice kubepods-besteffort-podcc5c46ef_a360_454e_99a7_a2960943388e.slice. Dec 13 14:28:45.640990 kubelet[2056]: I1213 14:28:45.640938 2056 topology_manager.go:215] "Topology Admit Handler" podUID="3e04efab-3760-4c49-bbe8-e5bf7ba8fe72" podNamespace="kube-system" podName="coredns-76f75df574-47pvb" Dec 13 14:28:45.641182 kubelet[2056]: I1213 14:28:45.641155 2056 topology_manager.go:215] "Topology Admit Handler" podUID="f79b0fce-d155-45be-9d4e-da78639b7b3e" podNamespace="kube-system" podName="coredns-76f75df574-cm7hk" Dec 13 14:28:45.642959 kubelet[2056]: I1213 14:28:45.642926 2056 topology_manager.go:215] "Topology Admit Handler" podUID="994c246b-64eb-4675-9912-f2a04673e055" podNamespace="calico-system" podName="calico-kube-controllers-5d54c8c5f7-s76hx" Dec 13 14:28:45.643135 kubelet[2056]: I1213 14:28:45.643106 2056 topology_manager.go:215] "Topology Admit Handler" podUID="947af00f-f596-478c-aa97-e03974cea6ab" podNamespace="calico-apiserver" podName="calico-apiserver-5b476db8c-2fnt7" Dec 13 14:28:45.647195 systemd[1]: Created slice kubepods-burstable-podf79b0fce_d155_45be_9d4e_da78639b7b3e.slice. Dec 13 14:28:45.651864 systemd[1]: Created slice kubepods-burstable-pod3e04efab_3760_4c49_bbe8_e5bf7ba8fe72.slice. Dec 13 14:28:45.655553 env[1212]: time="2024-12-13T14:28:45.655500275Z" level=info msg="shim disconnected" id=e180fbaf6744be99a4cc7de153425c3aea36d9627039fd10252eb0e4e5f8fe39 Dec 13 14:28:45.655553 env[1212]: time="2024-12-13T14:28:45.655548556Z" level=warning msg="cleaning up after shim disconnected" id=e180fbaf6744be99a4cc7de153425c3aea36d9627039fd10252eb0e4e5f8fe39 namespace=k8s.io Dec 13 14:28:45.655553 env[1212]: time="2024-12-13T14:28:45.655559055Z" level=info msg="cleaning up dead shim" Dec 13 14:28:45.656337 systemd[1]: Created slice kubepods-besteffort-pod947af00f_f596_478c_aa97_e03974cea6ab.slice. Dec 13 14:28:45.660159 systemd[1]: Created slice kubepods-besteffort-pod994c246b_64eb_4675_9912_f2a04673e055.slice. Dec 13 14:28:45.664456 env[1212]: time="2024-12-13T14:28:45.664389768Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:28:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2781 runtime=io.containerd.runc.v2\n" Dec 13 14:28:45.750195 kubelet[2056]: I1213 14:28:45.750088 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/947af00f-f596-478c-aa97-e03974cea6ab-calico-apiserver-certs\") pod \"calico-apiserver-5b476db8c-2fnt7\" (UID: \"947af00f-f596-478c-aa97-e03974cea6ab\") " pod="calico-apiserver/calico-apiserver-5b476db8c-2fnt7" Dec 13 14:28:45.750195 kubelet[2056]: I1213 14:28:45.750164 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/994c246b-64eb-4675-9912-f2a04673e055-tigera-ca-bundle\") pod \"calico-kube-controllers-5d54c8c5f7-s76hx\" (UID: \"994c246b-64eb-4675-9912-f2a04673e055\") " pod="calico-system/calico-kube-controllers-5d54c8c5f7-s76hx" Dec 13 14:28:45.750429 kubelet[2056]: I1213 14:28:45.750260 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cc5c46ef-a360-454e-99a7-a2960943388e-calico-apiserver-certs\") pod \"calico-apiserver-5b476db8c-kglgd\" (UID: \"cc5c46ef-a360-454e-99a7-a2960943388e\") " pod="calico-apiserver/calico-apiserver-5b476db8c-kglgd" Dec 13 14:28:45.750429 kubelet[2056]: I1213 14:28:45.750394 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zq48t\" (UniqueName: \"kubernetes.io/projected/994c246b-64eb-4675-9912-f2a04673e055-kube-api-access-zq48t\") pod \"calico-kube-controllers-5d54c8c5f7-s76hx\" (UID: \"994c246b-64eb-4675-9912-f2a04673e055\") " pod="calico-system/calico-kube-controllers-5d54c8c5f7-s76hx" Dec 13 14:28:45.750599 kubelet[2056]: I1213 14:28:45.750435 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hknkq\" (UniqueName: \"kubernetes.io/projected/947af00f-f596-478c-aa97-e03974cea6ab-kube-api-access-hknkq\") pod \"calico-apiserver-5b476db8c-2fnt7\" (UID: \"947af00f-f596-478c-aa97-e03974cea6ab\") " pod="calico-apiserver/calico-apiserver-5b476db8c-2fnt7" Dec 13 14:28:45.750599 kubelet[2056]: I1213 14:28:45.750461 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f79b0fce-d155-45be-9d4e-da78639b7b3e-config-volume\") pod \"coredns-76f75df574-cm7hk\" (UID: \"f79b0fce-d155-45be-9d4e-da78639b7b3e\") " pod="kube-system/coredns-76f75df574-cm7hk" Dec 13 14:28:45.750599 kubelet[2056]: I1213 14:28:45.750488 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9qphj\" (UniqueName: \"kubernetes.io/projected/f79b0fce-d155-45be-9d4e-da78639b7b3e-kube-api-access-9qphj\") pod \"coredns-76f75df574-cm7hk\" (UID: \"f79b0fce-d155-45be-9d4e-da78639b7b3e\") " pod="kube-system/coredns-76f75df574-cm7hk" Dec 13 14:28:45.750599 kubelet[2056]: I1213 14:28:45.750513 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3e04efab-3760-4c49-bbe8-e5bf7ba8fe72-config-volume\") pod \"coredns-76f75df574-47pvb\" (UID: \"3e04efab-3760-4c49-bbe8-e5bf7ba8fe72\") " pod="kube-system/coredns-76f75df574-47pvb" Dec 13 14:28:45.750599 kubelet[2056]: I1213 14:28:45.750537 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r2zhf\" (UniqueName: \"kubernetes.io/projected/3e04efab-3760-4c49-bbe8-e5bf7ba8fe72-kube-api-access-r2zhf\") pod \"coredns-76f75df574-47pvb\" (UID: \"3e04efab-3760-4c49-bbe8-e5bf7ba8fe72\") " pod="kube-system/coredns-76f75df574-47pvb" Dec 13 14:28:45.750715 kubelet[2056]: I1213 14:28:45.750566 2056 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rxzw6\" (UniqueName: \"kubernetes.io/projected/cc5c46ef-a360-454e-99a7-a2960943388e-kube-api-access-rxzw6\") pod \"calico-apiserver-5b476db8c-kglgd\" (UID: \"cc5c46ef-a360-454e-99a7-a2960943388e\") " pod="calico-apiserver/calico-apiserver-5b476db8c-kglgd" Dec 13 14:28:45.931279 env[1212]: time="2024-12-13T14:28:45.931100127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b476db8c-kglgd,Uid:cc5c46ef-a360-454e-99a7-a2960943388e,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:28:45.950039 kubelet[2056]: E1213 14:28:45.949991 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:45.950670 env[1212]: time="2024-12-13T14:28:45.950598170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cm7hk,Uid:f79b0fce-d155-45be-9d4e-da78639b7b3e,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:45.954469 kubelet[2056]: E1213 14:28:45.954427 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:45.954955 env[1212]: time="2024-12-13T14:28:45.954913443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-47pvb,Uid:3e04efab-3760-4c49-bbe8-e5bf7ba8fe72,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:45.960278 env[1212]: time="2024-12-13T14:28:45.960189992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b476db8c-2fnt7,Uid:947af00f-f596-478c-aa97-e03974cea6ab,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:28:45.963070 env[1212]: time="2024-12-13T14:28:45.962991462Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d54c8c5f7-s76hx,Uid:994c246b-64eb-4675-9912-f2a04673e055,Namespace:calico-system,Attempt:0,}" Dec 13 14:28:46.017890 env[1212]: time="2024-12-13T14:28:46.017779751Z" level=error msg="Failed to destroy network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.018325 env[1212]: time="2024-12-13T14:28:46.018287434Z" level=error msg="encountered an error cleaning up failed sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.018386 env[1212]: time="2024-12-13T14:28:46.018353528Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b476db8c-kglgd,Uid:cc5c46ef-a360-454e-99a7-a2960943388e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.018713 kubelet[2056]: E1213 14:28:46.018675 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.018794 kubelet[2056]: E1213 14:28:46.018748 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5b476db8c-kglgd" Dec 13 14:28:46.018794 kubelet[2056]: E1213 14:28:46.018776 2056 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5b476db8c-kglgd" Dec 13 14:28:46.018855 kubelet[2056]: E1213 14:28:46.018834 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5b476db8c-kglgd_calico-apiserver(cc5c46ef-a360-454e-99a7-a2960943388e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5b476db8c-kglgd_calico-apiserver(cc5c46ef-a360-454e-99a7-a2960943388e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b476db8c-kglgd" podUID="cc5c46ef-a360-454e-99a7-a2960943388e" Dec 13 14:28:46.276227 env[1212]: time="2024-12-13T14:28:46.276157492Z" level=error msg="Failed to destroy network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.277181 env[1212]: time="2024-12-13T14:28:46.277144906Z" level=error msg="encountered an error cleaning up failed sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.277346 env[1212]: time="2024-12-13T14:28:46.277307762Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cm7hk,Uid:f79b0fce-d155-45be-9d4e-da78639b7b3e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.277939 kubelet[2056]: E1213 14:28:46.277707 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.277939 kubelet[2056]: E1213 14:28:46.277797 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-cm7hk" Dec 13 14:28:46.277939 kubelet[2056]: E1213 14:28:46.277825 2056 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-cm7hk" Dec 13 14:28:46.279715 kubelet[2056]: E1213 14:28:46.277900 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-cm7hk_kube-system(f79b0fce-d155-45be-9d4e-da78639b7b3e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-cm7hk_kube-system(f79b0fce-d155-45be-9d4e-da78639b7b3e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-cm7hk" podUID="f79b0fce-d155-45be-9d4e-da78639b7b3e" Dec 13 14:28:46.281744 env[1212]: time="2024-12-13T14:28:46.281683508Z" level=error msg="Failed to destroy network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.282345 env[1212]: time="2024-12-13T14:28:46.282308752Z" level=error msg="encountered an error cleaning up failed sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.282528 env[1212]: time="2024-12-13T14:28:46.282474133Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-47pvb,Uid:3e04efab-3760-4c49-bbe8-e5bf7ba8fe72,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.282940 kubelet[2056]: E1213 14:28:46.282903 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.283040 kubelet[2056]: E1213 14:28:46.282986 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-47pvb" Dec 13 14:28:46.283040 kubelet[2056]: E1213 14:28:46.283016 2056 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-47pvb" Dec 13 14:28:46.283251 kubelet[2056]: E1213 14:28:46.283139 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-47pvb_kube-system(3e04efab-3760-4c49-bbe8-e5bf7ba8fe72)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-47pvb_kube-system(3e04efab-3760-4c49-bbe8-e5bf7ba8fe72)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-47pvb" podUID="3e04efab-3760-4c49-bbe8-e5bf7ba8fe72" Dec 13 14:28:46.311497 env[1212]: time="2024-12-13T14:28:46.311423179Z" level=error msg="Failed to destroy network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.311872 env[1212]: time="2024-12-13T14:28:46.311840021Z" level=error msg="encountered an error cleaning up failed sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.311933 env[1212]: time="2024-12-13T14:28:46.311907278Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b476db8c-2fnt7,Uid:947af00f-f596-478c-aa97-e03974cea6ab,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.312272 kubelet[2056]: E1213 14:28:46.312241 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.312354 kubelet[2056]: E1213 14:28:46.312322 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5b476db8c-2fnt7" Dec 13 14:28:46.312354 kubelet[2056]: E1213 14:28:46.312351 2056 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5b476db8c-2fnt7" Dec 13 14:28:46.312430 kubelet[2056]: E1213 14:28:46.312424 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5b476db8c-2fnt7_calico-apiserver(947af00f-f596-478c-aa97-e03974cea6ab)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5b476db8c-2fnt7_calico-apiserver(947af00f-f596-478c-aa97-e03974cea6ab)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b476db8c-2fnt7" podUID="947af00f-f596-478c-aa97-e03974cea6ab" Dec 13 14:28:46.314261 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510-shm.mount: Deactivated successfully. Dec 13 14:28:46.319908 env[1212]: time="2024-12-13T14:28:46.319820766Z" level=error msg="Failed to destroy network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.320287 env[1212]: time="2024-12-13T14:28:46.320241276Z" level=error msg="encountered an error cleaning up failed sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.320355 env[1212]: time="2024-12-13T14:28:46.320295047Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d54c8c5f7-s76hx,Uid:994c246b-64eb-4675-9912-f2a04673e055,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.320567 kubelet[2056]: E1213 14:28:46.320514 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.320644 kubelet[2056]: E1213 14:28:46.320591 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d54c8c5f7-s76hx" Dec 13 14:28:46.320644 kubelet[2056]: E1213 14:28:46.320618 2056 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d54c8c5f7-s76hx" Dec 13 14:28:46.320743 kubelet[2056]: E1213 14:28:46.320724 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5d54c8c5f7-s76hx_calico-system(994c246b-64eb-4675-9912-f2a04673e055)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5d54c8c5f7-s76hx_calico-system(994c246b-64eb-4675-9912-f2a04673e055)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d54c8c5f7-s76hx" podUID="994c246b-64eb-4675-9912-f2a04673e055" Dec 13 14:28:46.322502 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021-shm.mount: Deactivated successfully. Dec 13 14:28:46.380534 kubelet[2056]: E1213 14:28:46.380478 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:46.382153 env[1212]: time="2024-12-13T14:28:46.382094665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:28:46.382653 kubelet[2056]: I1213 14:28:46.382620 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:28:46.384627 env[1212]: time="2024-12-13T14:28:46.383383805Z" level=info msg="StopPodSandbox for \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\"" Dec 13 14:28:46.384798 kubelet[2056]: I1213 14:28:46.383775 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:28:46.384898 env[1212]: time="2024-12-13T14:28:46.384851521Z" level=info msg="StopPodSandbox for \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\"" Dec 13 14:28:46.389895 kubelet[2056]: I1213 14:28:46.389845 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Dec 13 14:28:46.390834 env[1212]: time="2024-12-13T14:28:46.390791003Z" level=info msg="StopPodSandbox for \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\"" Dec 13 14:28:46.391860 kubelet[2056]: I1213 14:28:46.391839 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:28:46.392627 env[1212]: time="2024-12-13T14:28:46.392591654Z" level=info msg="StopPodSandbox for \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\"" Dec 13 14:28:46.393433 kubelet[2056]: I1213 14:28:46.393391 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:28:46.393950 env[1212]: time="2024-12-13T14:28:46.393901033Z" level=info msg="StopPodSandbox for \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\"" Dec 13 14:28:46.431281 env[1212]: time="2024-12-13T14:28:46.431215316Z" level=error msg="StopPodSandbox for \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\" failed" error="failed to destroy network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.432064 kubelet[2056]: E1213 14:28:46.431820 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:28:46.432064 kubelet[2056]: E1213 14:28:46.431929 2056 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021"} Dec 13 14:28:46.432064 kubelet[2056]: E1213 14:28:46.431976 2056 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"994c246b-64eb-4675-9912-f2a04673e055\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:28:46.432064 kubelet[2056]: E1213 14:28:46.432014 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"994c246b-64eb-4675-9912-f2a04673e055\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d54c8c5f7-s76hx" podUID="994c246b-64eb-4675-9912-f2a04673e055" Dec 13 14:28:46.441011 env[1212]: time="2024-12-13T14:28:46.440914608Z" level=error msg="StopPodSandbox for \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\" failed" error="failed to destroy network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.441360 kubelet[2056]: E1213 14:28:46.441312 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:28:46.441452 kubelet[2056]: E1213 14:28:46.441392 2056 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df"} Dec 13 14:28:46.441452 kubelet[2056]: E1213 14:28:46.441428 2056 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e04efab-3760-4c49-bbe8-e5bf7ba8fe72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:28:46.441581 kubelet[2056]: E1213 14:28:46.441461 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e04efab-3760-4c49-bbe8-e5bf7ba8fe72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-47pvb" podUID="3e04efab-3760-4c49-bbe8-e5bf7ba8fe72" Dec 13 14:28:46.444849 env[1212]: time="2024-12-13T14:28:46.444782881Z" level=error msg="StopPodSandbox for \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\" failed" error="failed to destroy network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.445051 kubelet[2056]: E1213 14:28:46.445013 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Dec 13 14:28:46.445051 kubelet[2056]: E1213 14:28:46.445042 2056 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a"} Dec 13 14:28:46.445171 kubelet[2056]: E1213 14:28:46.445105 2056 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cc5c46ef-a360-454e-99a7-a2960943388e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:28:46.445171 kubelet[2056]: E1213 14:28:46.445129 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cc5c46ef-a360-454e-99a7-a2960943388e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b476db8c-kglgd" podUID="cc5c46ef-a360-454e-99a7-a2960943388e" Dec 13 14:28:46.461521 env[1212]: time="2024-12-13T14:28:46.461440458Z" level=error msg="StopPodSandbox for \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\" failed" error="failed to destroy network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.461765 kubelet[2056]: E1213 14:28:46.461725 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:28:46.461845 kubelet[2056]: E1213 14:28:46.461783 2056 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510"} Dec 13 14:28:46.461845 kubelet[2056]: E1213 14:28:46.461841 2056 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"947af00f-f596-478c-aa97-e03974cea6ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:28:46.461941 kubelet[2056]: E1213 14:28:46.461878 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"947af00f-f596-478c-aa97-e03974cea6ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b476db8c-2fnt7" podUID="947af00f-f596-478c-aa97-e03974cea6ab" Dec 13 14:28:46.465187 env[1212]: time="2024-12-13T14:28:46.465126128Z" level=error msg="StopPodSandbox for \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\" failed" error="failed to destroy network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:46.465519 kubelet[2056]: E1213 14:28:46.465458 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:28:46.465519 kubelet[2056]: E1213 14:28:46.465518 2056 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941"} Dec 13 14:28:46.465832 kubelet[2056]: E1213 14:28:46.465558 2056 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f79b0fce-d155-45be-9d4e-da78639b7b3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:28:46.465832 kubelet[2056]: E1213 14:28:46.465591 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f79b0fce-d155-45be-9d4e-da78639b7b3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-cm7hk" podUID="f79b0fce-d155-45be-9d4e-da78639b7b3e" Dec 13 14:28:47.284526 systemd[1]: Created slice kubepods-besteffort-pod3f58d04b_d594_4e8a_bd4a_0d935f5eb68e.slice. Dec 13 14:28:47.286724 env[1212]: time="2024-12-13T14:28:47.286682829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xj7z9,Uid:3f58d04b-d594-4e8a-bd4a-0d935f5eb68e,Namespace:calico-system,Attempt:0,}" Dec 13 14:28:47.556998 env[1212]: time="2024-12-13T14:28:47.556843356Z" level=error msg="Failed to destroy network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:47.557313 env[1212]: time="2024-12-13T14:28:47.557273063Z" level=error msg="encountered an error cleaning up failed sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:47.557370 env[1212]: time="2024-12-13T14:28:47.557338876Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xj7z9,Uid:3f58d04b-d594-4e8a-bd4a-0d935f5eb68e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:47.557667 kubelet[2056]: E1213 14:28:47.557641 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:47.557978 kubelet[2056]: E1213 14:28:47.557715 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xj7z9" Dec 13 14:28:47.557978 kubelet[2056]: E1213 14:28:47.557769 2056 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xj7z9" Dec 13 14:28:47.557978 kubelet[2056]: E1213 14:28:47.557838 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xj7z9_calico-system(3f58d04b-d594-4e8a-bd4a-0d935f5eb68e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xj7z9_calico-system(3f58d04b-d594-4e8a-bd4a-0d935f5eb68e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:47.559370 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9-shm.mount: Deactivated successfully. Dec 13 14:28:48.397854 kubelet[2056]: I1213 14:28:48.397807 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:28:48.399519 env[1212]: time="2024-12-13T14:28:48.398406549Z" level=info msg="StopPodSandbox for \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\"" Dec 13 14:28:48.423986 env[1212]: time="2024-12-13T14:28:48.423919656Z" level=error msg="StopPodSandbox for \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\" failed" error="failed to destroy network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:48.424294 kubelet[2056]: E1213 14:28:48.424249 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:28:48.424360 kubelet[2056]: E1213 14:28:48.424308 2056 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9"} Dec 13 14:28:48.424360 kubelet[2056]: E1213 14:28:48.424356 2056 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:28:48.424455 kubelet[2056]: E1213 14:28:48.424393 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xj7z9" podUID="3f58d04b-d594-4e8a-bd4a-0d935f5eb68e" Dec 13 14:28:49.720750 systemd[1]: Started sshd@8-10.0.0.115:22-10.0.0.1:53200.service. Dec 13 14:28:49.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.115:22-10.0.0.1:53200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:49.725941 kernel: kauditd_printk_skb: 45 callbacks suppressed Dec 13 14:28:49.726145 kernel: audit: type=1130 audit(1734100129.720:983): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.115:22-10.0.0.1:53200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:49.768000 audit[3166]: USER_ACCT pid=3166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.768969 sshd[3166]: Accepted publickey for core from 10.0.0.1 port 53200 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:49.789900 sshd[3166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:49.770000 audit[3166]: CRED_ACQ pid=3166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.794748 systemd-logind[1203]: New session 9 of user core. Dec 13 14:28:49.795378 systemd[1]: Started session-9.scope. Dec 13 14:28:49.799519 kernel: audit: type=1101 audit(1734100129.768:984): pid=3166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.799584 kernel: audit: type=1103 audit(1734100129.770:985): pid=3166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.799607 kernel: audit: type=1006 audit(1734100129.770:986): pid=3166 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 14:28:49.770000 audit[3166]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6b493890 a2=3 a3=0 items=0 ppid=1 pid=3166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:49.807468 kernel: audit: type=1300 audit(1734100129.770:986): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6b493890 a2=3 a3=0 items=0 ppid=1 pid=3166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:49.807608 kernel: audit: type=1327 audit(1734100129.770:986): proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:49.770000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:49.801000 audit[3166]: USER_START pid=3166 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.835225 kernel: audit: type=1105 audit(1734100129.801:987): pid=3166 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.835280 kernel: audit: type=1103 audit(1734100129.802:988): pid=3168 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.802000 audit[3168]: CRED_ACQ pid=3168 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.925760 sshd[3166]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:49.926000 audit[3166]: USER_END pid=3166 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.928181 systemd[1]: sshd@8-10.0.0.115:22-10.0.0.1:53200.service: Deactivated successfully. Dec 13 14:28:49.928848 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:28:49.932558 systemd-logind[1203]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:28:49.933296 systemd-logind[1203]: Removed session 9. Dec 13 14:28:49.926000 audit[3166]: CRED_DISP pid=3166 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.964840 kernel: audit: type=1106 audit(1734100129.926:989): pid=3166 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.964912 kernel: audit: type=1104 audit(1734100129.926:990): pid=3166 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:49.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.115:22-10.0.0.1:53200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:54.942912 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:28:54.943134 kernel: audit: type=1130 audit(1734100134.930:992): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.115:22-10.0.0.1:53202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:54.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.115:22-10.0.0.1:53202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:54.930315 systemd[1]: Started sshd@9-10.0.0.115:22-10.0.0.1:53202.service. Dec 13 14:28:54.982000 audit[3185]: USER_ACCT pid=3185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:54.982928 sshd[3185]: Accepted publickey for core from 10.0.0.1 port 53202 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:54.987000 audit[3185]: CRED_ACQ pid=3185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:54.988090 sshd[3185]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:54.992974 kernel: audit: type=1101 audit(1734100134.982:993): pid=3185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:54.993026 kernel: audit: type=1103 audit(1734100134.987:994): pid=3185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:54.993111 kernel: audit: type=1006 audit(1734100134.987:995): pid=3185 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:28:54.992653 systemd[1]: Started session-10.scope. Dec 13 14:28:54.994085 systemd-logind[1203]: New session 10 of user core. Dec 13 14:28:54.987000 audit[3185]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4c5009d0 a2=3 a3=0 items=0 ppid=1 pid=3185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:55.000401 kernel: audit: type=1300 audit(1734100134.987:995): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4c5009d0 a2=3 a3=0 items=0 ppid=1 pid=3185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:55.000443 kernel: audit: type=1327 audit(1734100134.987:995): proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:54.987000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:54.998000 audit[3185]: USER_START pid=3185 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:55.006674 kernel: audit: type=1105 audit(1734100134.998:996): pid=3185 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:55.006726 kernel: audit: type=1103 audit(1734100135.000:997): pid=3187 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:55.000000 audit[3187]: CRED_ACQ pid=3187 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:55.129473 sshd[3185]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:55.139994 kernel: audit: type=1106 audit(1734100135.130:998): pid=3185 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:55.140097 kernel: audit: type=1104 audit(1734100135.130:999): pid=3185 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:55.130000 audit[3185]: USER_END pid=3185 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:55.130000 audit[3185]: CRED_DISP pid=3185 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:55.138881 systemd[1]: sshd@9-10.0.0.115:22-10.0.0.1:53202.service: Deactivated successfully. Dec 13 14:28:55.139588 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:28:55.140507 systemd-logind[1203]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:28:55.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.115:22-10.0.0.1:53202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:55.141458 systemd-logind[1203]: Removed session 10. Dec 13 14:28:57.281270 env[1212]: time="2024-12-13T14:28:57.281226037Z" level=info msg="StopPodSandbox for \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\"" Dec 13 14:28:57.281956 env[1212]: time="2024-12-13T14:28:57.281905432Z" level=info msg="StopPodSandbox for \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\"" Dec 13 14:28:57.305830 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2284729743.mount: Deactivated successfully. Dec 13 14:28:57.312675 env[1212]: time="2024-12-13T14:28:57.312627812Z" level=error msg="StopPodSandbox for \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\" failed" error="failed to destroy network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:57.313098 kubelet[2056]: E1213 14:28:57.313067 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:28:57.313381 kubelet[2056]: E1213 14:28:57.313131 2056 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510"} Dec 13 14:28:57.313381 kubelet[2056]: E1213 14:28:57.313183 2056 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"947af00f-f596-478c-aa97-e03974cea6ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:28:57.313381 kubelet[2056]: E1213 14:28:57.313226 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"947af00f-f596-478c-aa97-e03974cea6ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b476db8c-2fnt7" podUID="947af00f-f596-478c-aa97-e03974cea6ab" Dec 13 14:28:57.326458 env[1212]: time="2024-12-13T14:28:57.326398953Z" level=error msg="StopPodSandbox for \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\" failed" error="failed to destroy network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:57.326741 kubelet[2056]: E1213 14:28:57.326709 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Dec 13 14:28:57.326818 kubelet[2056]: E1213 14:28:57.326769 2056 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a"} Dec 13 14:28:57.326861 kubelet[2056]: E1213 14:28:57.326821 2056 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cc5c46ef-a360-454e-99a7-a2960943388e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:28:57.326861 kubelet[2056]: E1213 14:28:57.326858 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cc5c46ef-a360-454e-99a7-a2960943388e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b476db8c-kglgd" podUID="cc5c46ef-a360-454e-99a7-a2960943388e" Dec 13 14:28:58.780957 env[1212]: time="2024-12-13T14:28:58.780866970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:58.784240 env[1212]: time="2024-12-13T14:28:58.784188202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:58.786331 env[1212]: time="2024-12-13T14:28:58.786292991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:58.787974 env[1212]: time="2024-12-13T14:28:58.787930785Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:58.788591 env[1212]: time="2024-12-13T14:28:58.788547342Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:28:58.801577 env[1212]: time="2024-12-13T14:28:58.801523440Z" level=info msg="CreateContainer within sandbox \"56351ecf54cc469bc4092e4b5da328dd866110fe07100c9eda67008baa8b5938\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:28:58.829983 env[1212]: time="2024-12-13T14:28:58.829880710Z" level=info msg="CreateContainer within sandbox \"56351ecf54cc469bc4092e4b5da328dd866110fe07100c9eda67008baa8b5938\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bccda309c70b51afead5ce0ad9713f4a4ae946185aba21239e78813b01f60a80\"" Dec 13 14:28:58.830530 env[1212]: time="2024-12-13T14:28:58.830475206Z" level=info msg="StartContainer for \"bccda309c70b51afead5ce0ad9713f4a4ae946185aba21239e78813b01f60a80\"" Dec 13 14:28:58.851999 systemd[1]: Started cri-containerd-bccda309c70b51afead5ce0ad9713f4a4ae946185aba21239e78813b01f60a80.scope. Dec 13 14:28:58.870000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.870000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fc6b0ec6be8 items=0 ppid=2506 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263636461333039633730623531616665616435636530616439373133 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.871000 audit: BPF prog-id=136 op=LOAD Dec 13 14:28:58.871000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000349b98 items=0 ppid=2506 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263636461333039633730623531616665616435636530616439373133 Dec 13 14:28:58.872000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.872000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.872000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.872000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.872000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.872000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.872000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.872000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.872000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.872000 audit: BPF prog-id=137 op=LOAD Dec 13 14:28:58.872000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000349be8 items=0 ppid=2506 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263636461333039633730623531616665616435636530616439373133 Dec 13 14:28:58.873000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:28:58.873000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.873000 audit: BPF prog-id=138 op=LOAD Dec 13 14:28:58.873000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000349c78 items=0 ppid=2506 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263636461333039633730623531616665616435636530616439373133 Dec 13 14:28:59.248790 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:28:59.249099 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. Dec 13 14:28:59.289323 env[1212]: time="2024-12-13T14:28:59.288756712Z" level=info msg="StartContainer for \"bccda309c70b51afead5ce0ad9713f4a4ae946185aba21239e78813b01f60a80\" returns successfully" Dec 13 14:28:59.422654 kubelet[2056]: E1213 14:28:59.422168 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:00.134327 systemd[1]: Started sshd@10-10.0.0.115:22-10.0.0.1:33734.service. Dec 13 14:29:00.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.115:22-10.0.0.1:33734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:00.135543 kernel: kauditd_printk_skb: 44 callbacks suppressed Dec 13 14:29:00.135608 kernel: audit: type=1130 audit(1734100140.134:1007): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.115:22-10.0.0.1:33734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:00.177000 audit[3343]: USER_ACCT pid=3343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.177842 sshd[3343]: Accepted publickey for core from 10.0.0.1 port 33734 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:00.180235 sshd[3343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:00.179000 audit[3343]: CRED_ACQ pid=3343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.184551 systemd-logind[1203]: New session 11 of user core. Dec 13 14:29:00.185516 systemd[1]: Started session-11.scope. Dec 13 14:29:00.185624 kernel: audit: type=1101 audit(1734100140.177:1008): pid=3343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.185663 kernel: audit: type=1103 audit(1734100140.179:1009): pid=3343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.185683 kernel: audit: type=1006 audit(1734100140.179:1010): pid=3343 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:29:00.187882 kernel: audit: type=1300 audit(1734100140.179:1010): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5c6676a0 a2=3 a3=0 items=0 ppid=1 pid=3343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.179000 audit[3343]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5c6676a0 a2=3 a3=0 items=0 ppid=1 pid=3343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.192081 kernel: audit: type=1327 audit(1734100140.179:1010): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:00.179000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:00.190000 audit[3343]: USER_START pid=3343 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.198431 kernel: audit: type=1105 audit(1734100140.190:1011): pid=3343 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.198574 kernel: audit: type=1103 audit(1734100140.191:1012): pid=3345 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.191000 audit[3345]: CRED_ACQ pid=3345 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.282456 env[1212]: time="2024-12-13T14:29:00.281552082Z" level=info msg="StopPodSandbox for \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\"" Dec 13 14:29:00.282456 env[1212]: time="2024-12-13T14:29:00.281575366Z" level=info msg="StopPodSandbox for \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\"" Dec 13 14:29:00.282456 env[1212]: time="2024-12-13T14:29:00.281549557Z" level=info msg="StopPodSandbox for \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\"" Dec 13 14:29:00.363912 sshd[3343]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:00.365000 audit[3343]: USER_END pid=3343 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.365000 audit[3343]: CRED_DISP pid=3343 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.373624 systemd[1]: sshd@10-10.0.0.115:22-10.0.0.1:33734.service: Deactivated successfully. Dec 13 14:29:00.374326 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:29:00.374987 systemd-logind[1203]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:29:00.376068 kernel: audit: type=1106 audit(1734100140.365:1013): pid=3343 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.376138 kernel: audit: type=1104 audit(1734100140.365:1014): pid=3343 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.115:22-10.0.0.1:33734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:00.376362 systemd[1]: Started sshd@11-10.0.0.115:22-10.0.0.1:33744.service. Dec 13 14:29:00.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.115:22-10.0.0.1:33744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:00.377424 systemd-logind[1203]: Removed session 11. Dec 13 14:29:00.419000 audit[3430]: USER_ACCT pid=3430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.419554 sshd[3430]: Accepted publickey for core from 10.0.0.1 port 33744 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:00.420000 audit[3430]: CRED_ACQ pid=3430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.420000 audit[3430]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06b8a2c0 a2=3 a3=0 items=0 ppid=1 pid=3430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.420000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:00.420449 sshd[3430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:00.425362 kubelet[2056]: E1213 14:29:00.424251 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:00.424346 systemd-logind[1203]: New session 12 of user core. Dec 13 14:29:00.425094 systemd[1]: Started session-12.scope. Dec 13 14:29:00.430000 audit[3430]: USER_START pid=3430 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.431000 audit[3432]: CRED_ACQ pid=3432 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:00.446873 systemd[1]: run-containerd-runc-k8s.io-bccda309c70b51afead5ce0ad9713f4a4ae946185aba21239e78813b01f60a80-runc.tp5urI.mount: Deactivated successfully. Dec 13 14:29:00.489582 kubelet[2056]: I1213 14:29:00.487823 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-8rcr6" podStartSLOduration=2.504805845 podStartE2EDuration="29.487767901s" podCreationTimestamp="2024-12-13 14:28:31 +0000 UTC" firstStartedPulling="2024-12-13 14:28:31.805870401 +0000 UTC m=+20.595971280" lastFinishedPulling="2024-12-13 14:28:58.788832457 +0000 UTC m=+47.578933336" observedRunningTime="2024-12-13 14:28:59.485500872 +0000 UTC m=+48.275601751" watchObservedRunningTime="2024-12-13 14:29:00.487767901 +0000 UTC m=+49.277868780" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.485 [INFO][3408] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.486 [INFO][3408] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" iface="eth0" netns="/var/run/netns/cni-def7b1ca-83b3-13b4-b7a5-3d62116de01d" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.486 [INFO][3408] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" iface="eth0" netns="/var/run/netns/cni-def7b1ca-83b3-13b4-b7a5-3d62116de01d" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.489 [INFO][3408] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" iface="eth0" netns="/var/run/netns/cni-def7b1ca-83b3-13b4-b7a5-3d62116de01d" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.489 [INFO][3408] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.489 [INFO][3408] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.535 [INFO][3462] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" HandleID="k8s-pod-network.0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.536 [INFO][3462] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.536 [INFO][3462] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.674 [WARNING][3462] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" HandleID="k8s-pod-network.0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.675 [INFO][3462] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" HandleID="k8s-pod-network.0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.711 [INFO][3462] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:00.715608 env[1212]: 2024-12-13 14:29:00.713 [INFO][3408] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:00.718133 systemd[1]: run-netns-cni\x2ddef7b1ca\x2d83b3\x2d13b4\x2db7a5\x2d3d62116de01d.mount: Deactivated successfully. Dec 13 14:29:00.721201 env[1212]: time="2024-12-13T14:29:00.721142037Z" level=info msg="TearDown network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\" successfully" Dec 13 14:29:00.721201 env[1212]: time="2024-12-13T14:29:00.721194466Z" level=info msg="StopPodSandbox for \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\" returns successfully" Dec 13 14:29:00.721979 env[1212]: time="2024-12-13T14:29:00.721945505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d54c8c5f7-s76hx,Uid:994c246b-64eb-4675-9912-f2a04673e055,Namespace:calico-system,Attempt:1,}" Dec 13 14:29:00.724000 audit[3533]: AVC avc: denied { write } for pid=3533 comm="tee" name="fd" dev="proc" ino=24302 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:00.724000 audit[3533]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdea43aa1a a2=241 a3=1b6 items=1 ppid=3494 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.724000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:29:00.724000 audit: PATH item=0 name="/dev/fd/63" inode=25314 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:00.724000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:00.730000 audit[3550]: AVC avc: denied { write } for pid=3550 comm="tee" name="fd" dev="proc" ino=26684 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:00.730000 audit[3550]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd598f1a2c a2=241 a3=1b6 items=1 ppid=3493 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.730000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:29:00.730000 audit: PATH item=0 name="/dev/fd/63" inode=25325 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:00.730000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:00.732000 audit[3559]: AVC avc: denied { write } for pid=3559 comm="tee" name="fd" dev="proc" ino=24310 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:00.732000 audit[3559]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc6faca2a a2=241 a3=1b6 items=1 ppid=3505 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.732000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:29:00.732000 audit: PATH item=0 name="/dev/fd/63" inode=24307 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:00.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:00.734000 audit[3535]: AVC avc: denied { write } for pid=3535 comm="tee" name="fd" dev="proc" ino=24314 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:00.734000 audit[3535]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe183eda1b a2=241 a3=1b6 items=1 ppid=3504 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.734000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:29:00.734000 audit: PATH item=0 name="/dev/fd/63" inode=24293 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:00.734000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:00.758000 audit[3546]: AVC avc: denied { write } for pid=3546 comm="tee" name="fd" dev="proc" ino=24318 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:00.758000 audit[3546]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9947fa2a a2=241 a3=1b6 items=1 ppid=3495 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.758000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:29:00.758000 audit: PATH item=0 name="/dev/fd/63" inode=25319 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:00.758000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:00.759000 audit[3575]: AVC avc: denied { write } for pid=3575 comm="tee" name="fd" dev="proc" ino=24322 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:00.759000 audit[3575]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa416aa2b a2=241 a3=1b6 items=1 ppid=3511 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.759000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:29:00.759000 audit: PATH item=0 name="/dev/fd/63" inode=25715 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:00.759000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:00.768000 audit[3573]: AVC avc: denied { write } for pid=3573 comm="tee" name="fd" dev="proc" ino=26688 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:00.768000 audit[3573]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc82e80a2a a2=241 a3=1b6 items=1 ppid=3500 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:00.768000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:29:00.768000 audit: PATH item=0 name="/dev/fd/63" inode=25338 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:00.768000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:01.047018 sshd[3430]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:00.549 [INFO][3406] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:00.549 [INFO][3406] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" iface="eth0" netns="/var/run/netns/cni-c6139dda-e9db-f187-1b99-4fd4d60fd213" Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:00.549 [INFO][3406] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" iface="eth0" netns="/var/run/netns/cni-c6139dda-e9db-f187-1b99-4fd4d60fd213" Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:00.550 [INFO][3406] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" iface="eth0" netns="/var/run/netns/cni-c6139dda-e9db-f187-1b99-4fd4d60fd213" Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:00.550 [INFO][3406] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:00.550 [INFO][3406] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:00.575 [INFO][3471] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" HandleID="k8s-pod-network.959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:00.575 [INFO][3471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:00.711 [INFO][3471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:01.005 [WARNING][3471] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" HandleID="k8s-pod-network.959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:01.005 [INFO][3471] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" HandleID="k8s-pod-network.959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:01.043 [INFO][3471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:01.048501 env[1212]: 2024-12-13 14:29:01.046 [INFO][3406] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:01.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.115:22-10.0.0.1:33752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:01.050961 kubelet[2056]: E1213 14:29:01.049017 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:01.049631 systemd[1]: Started sshd@12-10.0.0.115:22-10.0.0.1:33752.service. Dec 13 14:29:01.052000 audit[3430]: USER_END pid=3430 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:01.052000 audit[3430]: CRED_DISP pid=3430 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:01.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.115:22-10.0.0.1:33744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:01.055236 env[1212]: time="2024-12-13T14:29:01.048659000Z" level=info msg="TearDown network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\" successfully" Dec 13 14:29:01.055236 env[1212]: time="2024-12-13T14:29:01.048702201Z" level=info msg="StopPodSandbox for \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\" returns successfully" Dec 13 14:29:01.055236 env[1212]: time="2024-12-13T14:29:01.049821711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-47pvb,Uid:3e04efab-3760-4c49-bbe8-e5bf7ba8fe72,Namespace:kube-system,Attempt:1,}" Dec 13 14:29:01.052413 systemd[1]: run-netns-cni\x2dc6139dda\x2de9db\x2df187\x2d1b99\x2d4fd4d60fd213.mount: Deactivated successfully. Dec 13 14:29:01.053908 systemd[1]: sshd@11-10.0.0.115:22-10.0.0.1:33744.service: Deactivated successfully. Dec 13 14:29:01.054773 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:29:01.055392 systemd-logind[1203]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:29:01.056350 systemd-logind[1203]: Removed session 12. Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:00.674 [INFO][3407] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:00.674 [INFO][3407] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" iface="eth0" netns="/var/run/netns/cni-fe8b3abe-f1ac-87a0-95f3-88d3d6841b0f" Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:00.675 [INFO][3407] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" iface="eth0" netns="/var/run/netns/cni-fe8b3abe-f1ac-87a0-95f3-88d3d6841b0f" Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:00.675 [INFO][3407] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" iface="eth0" netns="/var/run/netns/cni-fe8b3abe-f1ac-87a0-95f3-88d3d6841b0f" Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:00.675 [INFO][3407] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:00.675 [INFO][3407] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:00.695 [INFO][3479] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" HandleID="k8s-pod-network.7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:00.695 [INFO][3479] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:01.043 [INFO][3479] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:01.071 [WARNING][3479] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" HandleID="k8s-pod-network.7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:01.071 [INFO][3479] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" HandleID="k8s-pod-network.7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:01.077 [INFO][3479] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:01.082357 env[1212]: 2024-12-13 14:29:01.079 [INFO][3407] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:01.094550 systemd[1]: run-netns-cni\x2dfe8b3abe\x2df1ac\x2d87a0\x2d95f3\x2d88d3d6841b0f.mount: Deactivated successfully. Dec 13 14:29:01.096171 env[1212]: time="2024-12-13T14:29:01.096006164Z" level=info msg="TearDown network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\" successfully" Dec 13 14:29:01.096171 env[1212]: time="2024-12-13T14:29:01.096062620Z" level=info msg="StopPodSandbox for \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\" returns successfully" Dec 13 14:29:01.097150 kubelet[2056]: E1213 14:29:01.096556 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:01.097586 env[1212]: time="2024-12-13T14:29:01.097556532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cm7hk,Uid:f79b0fce-d155-45be-9d4e-da78639b7b3e,Namespace:kube-system,Attempt:1,}" Dec 13 14:29:01.135000 audit[3583]: USER_ACCT pid=3583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:01.136841 sshd[3583]: Accepted publickey for core from 10.0.0.1 port 33752 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:01.137363 sshd[3583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:01.136000 audit[3583]: CRED_ACQ pid=3583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:01.136000 audit[3583]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc772613b0 a2=3 a3=0 items=0 ppid=1 pid=3583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit: BPF prog-id=139 op=LOAD Dec 13 14:29:01.162000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9df489d0 a2=98 a3=3 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.162000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.162000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit: BPF prog-id=140 op=LOAD Dec 13 14:29:01.162000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9df487b0 a2=74 a3=540051 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.162000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.162000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.162000 audit: BPF prog-id=141 op=LOAD Dec 13 14:29:01.162000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9df487e0 a2=94 a3=2 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.162000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.162000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:29:01.194127 systemd-logind[1203]: New session 13 of user core. Dec 13 14:29:01.195159 systemd[1]: Started session-13.scope. Dec 13 14:29:01.199000 audit[3583]: USER_START pid=3583 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:01.201000 audit[3615]: CRED_ACQ pid=3615 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:01.299000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.299000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.299000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.299000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.299000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.299000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.299000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.299000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.299000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.299000 audit: BPF prog-id=142 op=LOAD Dec 13 14:29:01.299000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9df486a0 a2=40 a3=1 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.299000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.300000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:29:01.300000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.300000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd9df48770 a2=50 a3=7ffd9df48850 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.300000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9df486b0 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9df486e0 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9df485f0 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9df48700 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9df486e0 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9df486d0 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9df48700 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9df486e0 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9df48700 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9df486d0 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9df48740 a2=28 a3=0 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.307000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.307000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd9df484f0 a2=50 a3=1 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit: BPF prog-id=143 op=LOAD Dec 13 14:29:01.308000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd9df484f0 a2=94 a3=5 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.308000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd9df485a0 a2=50 a3=1 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd9df486c0 a2=4 a3=38 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { confidentiality } for pid=3614 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:01.308000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9df48710 a2=94 a3=6 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { confidentiality } for pid=3614 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:01.308000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9df47ec0 a2=94 a3=83 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.308000 audit[3614]: AVC avc: denied { confidentiality } for pid=3614 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:01.308000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9df47ec0 a2=94 a3=83 items=0 ppid=3498 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit: BPF prog-id=144 op=LOAD Dec 13 14:29:01.317000 audit[3638]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe17e04ab0 a2=98 a3=1999999999999999 items=0 ppid=3498 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.317000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:29:01.317000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit: BPF prog-id=145 op=LOAD Dec 13 14:29:01.317000 audit[3638]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe17e04990 a2=74 a3=ffff items=0 ppid=3498 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.317000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:29:01.317000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { perfmon } for pid=3638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit[3638]: AVC avc: denied { bpf } for pid=3638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.317000 audit: BPF prog-id=146 op=LOAD Dec 13 14:29:01.317000 audit[3638]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe17e049d0 a2=40 a3=7ffe17e04bb0 items=0 ppid=3498 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.317000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:29:01.317000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:29:01.368588 sshd[3583]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:01.377000 audit[3583]: USER_END pid=3583 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:01.377000 audit[3583]: CRED_DISP pid=3583 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:01.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.115:22-10.0.0.1:33752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:01.378695 systemd[1]: sshd@12-10.0.0.115:22-10.0.0.1:33752.service: Deactivated successfully. Dec 13 14:29:01.379405 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:29:01.381530 systemd-logind[1203]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:29:01.384648 systemd-logind[1203]: Removed session 13. Dec 13 14:29:01.405721 systemd-networkd[1029]: vxlan.calico: Link UP Dec 13 14:29:01.405731 systemd-networkd[1029]: vxlan.calico: Gained carrier Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit: BPF prog-id=147 op=LOAD Dec 13 14:29:01.443000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9da46140 a2=98 a3=ffffffff items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.443000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit: BPF prog-id=148 op=LOAD Dec 13 14:29:01.443000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9da45f50 a2=74 a3=540051 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.443000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.443000 audit: BPF prog-id=149 op=LOAD Dec 13 14:29:01.443000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9da45f80 a2=94 a3=2 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9da45e50 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9da45e80 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9da45d90 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9da45ea0 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9da45e80 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9da45e70 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9da45ea0 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9da45e80 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9da45ea0 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9da45e70 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9da45ee0 a2=28 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.444000 audit: BPF prog-id=150 op=LOAD Dec 13 14:29:01.444000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9da45d50 a2=40 a3=0 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.444000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:29:01.447000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.447000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe9da45d40 a2=50 a3=2800 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe9da45d40 a2=50 a3=2800 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.454000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit: BPF prog-id=151 op=LOAD Dec 13 14:29:01.454000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9da45560 a2=94 a3=2 items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.454000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.454000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { perfmon } for pid=3702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit[3702]: AVC avc: denied { bpf } for pid=3702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.454000 audit: BPF prog-id=152 op=LOAD Dec 13 14:29:01.454000 audit[3702]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9da45660 a2=94 a3=2d items=0 ppid=3498 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.454000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:01.461000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.461000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.461000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.461000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.461000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.461000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.461000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.461000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.461000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.461000 audit: BPF prog-id=153 op=LOAD Dec 13 14:29:01.461000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd2261a7c0 a2=98 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.461000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.462000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit: BPF prog-id=154 op=LOAD Dec 13 14:29:01.462000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2261a5a0 a2=74 a3=540051 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.462000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.462000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.462000 audit: BPF prog-id=155 op=LOAD Dec 13 14:29:01.462000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2261a5d0 a2=94 a3=2 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.462000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.462000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:29:01.495107 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali72c43ec3641: link becomes ready Dec 13 14:29:01.496141 systemd-networkd[1029]: cali72c43ec3641: Link UP Dec 13 14:29:01.496283 systemd-networkd[1029]: cali72c43ec3641: Gained carrier Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.304 [INFO][3622] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0 calico-kube-controllers-5d54c8c5f7- calico-system 994c246b-64eb-4675-9912-f2a04673e055 865 0 2024-12-13 14:28:31 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5d54c8c5f7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5d54c8c5f7-s76hx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali72c43ec3641 [] []}} ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Namespace="calico-system" Pod="calico-kube-controllers-5d54c8c5f7-s76hx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.304 [INFO][3622] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Namespace="calico-system" Pod="calico-kube-controllers-5d54c8c5f7-s76hx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.390 [INFO][3639] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" HandleID="k8s-pod-network.567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.406 [INFO][3639] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" HandleID="k8s-pod-network.567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005a3240), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5d54c8c5f7-s76hx", "timestamp":"2024-12-13 14:29:01.390950426 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.407 [INFO][3639] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.407 [INFO][3639] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.407 [INFO][3639] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.427 [INFO][3639] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" host="localhost" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.437 [INFO][3639] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.445 [INFO][3639] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.448 [INFO][3639] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.456 [INFO][3639] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.456 [INFO][3639] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" host="localhost" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.458 [INFO][3639] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70 Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.465 [INFO][3639] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" host="localhost" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.479 [INFO][3639] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" host="localhost" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.479 [INFO][3639] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" host="localhost" Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.479 [INFO][3639] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:01.547088 env[1212]: 2024-12-13 14:29:01.479 [INFO][3639] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" HandleID="k8s-pod-network.567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:01.548413 env[1212]: 2024-12-13 14:29:01.488 [INFO][3622] cni-plugin/k8s.go 386: Populated endpoint ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Namespace="calico-system" Pod="calico-kube-controllers-5d54c8c5f7-s76hx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0", GenerateName:"calico-kube-controllers-5d54c8c5f7-", Namespace:"calico-system", SelfLink:"", UID:"994c246b-64eb-4675-9912-f2a04673e055", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d54c8c5f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5d54c8c5f7-s76hx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali72c43ec3641", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:01.548413 env[1212]: 2024-12-13 14:29:01.488 [INFO][3622] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Namespace="calico-system" Pod="calico-kube-controllers-5d54c8c5f7-s76hx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:01.548413 env[1212]: 2024-12-13 14:29:01.488 [INFO][3622] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali72c43ec3641 ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Namespace="calico-system" Pod="calico-kube-controllers-5d54c8c5f7-s76hx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:01.548413 env[1212]: 2024-12-13 14:29:01.497 [INFO][3622] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Namespace="calico-system" Pod="calico-kube-controllers-5d54c8c5f7-s76hx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:01.548413 env[1212]: 2024-12-13 14:29:01.503 [INFO][3622] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Namespace="calico-system" Pod="calico-kube-controllers-5d54c8c5f7-s76hx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0", GenerateName:"calico-kube-controllers-5d54c8c5f7-", Namespace:"calico-system", SelfLink:"", UID:"994c246b-64eb-4675-9912-f2a04673e055", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d54c8c5f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70", Pod:"calico-kube-controllers-5d54c8c5f7-s76hx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali72c43ec3641", MAC:"e6:f4:7e:69:26:31", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:01.548413 env[1212]: 2024-12-13 14:29:01.543 [INFO][3622] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70" Namespace="calico-system" Pod="calico-kube-controllers-5d54c8c5f7-s76hx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit: BPF prog-id=156 op=LOAD Dec 13 14:29:01.593000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2261a490 a2=40 a3=1 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.593000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:29:01.593000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.593000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd2261a560 a2=50 a3=7ffd2261a640 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2261a4a0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2261a4d0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2261a3e0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2261a4f0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2261a4d0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2261a4c0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2261a4f0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2261a4d0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2261a4f0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2261a4c0 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2261a530 a2=28 a3=0 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd2261a2e0 a2=50 a3=1 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit: BPF prog-id=157 op=LOAD Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd2261a2e0 a2=94 a3=5 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd2261a390 a2=50 a3=1 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd2261a4b0 a2=4 a3=38 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.602000 audit[3710]: AVC avc: denied { confidentiality } for pid=3710 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:01.602000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd2261a500 a2=94 a3=6 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { confidentiality } for pid=3710 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:01.603000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd22619cb0 a2=94 a3=83 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.603000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { confidentiality } for pid=3710 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:01.603000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd22619cb0 a2=94 a3=83 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.603000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2261b6f0 a2=10 a3=208 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.603000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2261b590 a2=10 a3=3 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.603000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2261b530 a2=10 a3=3 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.603000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.603000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.603000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2261b530 a2=10 a3=7 items=0 ppid=3498 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.603000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:01.610000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:29:01.637303 systemd-networkd[1029]: calibdb21ca8c33: Link UP Dec 13 14:29:01.674218 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibdb21ca8c33: link becomes ready Dec 13 14:29:01.639247 systemd-networkd[1029]: calibdb21ca8c33: Gained carrier Dec 13 14:29:01.751000 audit[3764]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:01.751000 audit[3764]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff85a55580 a2=0 a3=7fff85a5556c items=0 ppid=3498 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.751000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:01.755950 env[1212]: time="2024-12-13T14:29:01.755743720Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:01.755950 env[1212]: time="2024-12-13T14:29:01.755804173Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:01.755950 env[1212]: time="2024-12-13T14:29:01.755832236Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:01.756175 env[1212]: time="2024-12-13T14:29:01.755956269Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70 pid=3775 runtime=io.containerd.runc.v2 Dec 13 14:29:01.757000 audit[3763]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3763 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:01.757000 audit[3763]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc7ac0c4a0 a2=0 a3=7ffc7ac0c48c items=0 ppid=3498 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.757000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:01.759000 audit[3771]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:01.759000 audit[3771]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff484e9190 a2=0 a3=7fff484e917c items=0 ppid=3498 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.759000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:01.764000 audit[3762]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3762 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:01.764000 audit[3762]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd37f77fb0 a2=0 a3=7ffd37f77f9c items=0 ppid=3498 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.764000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:01.767087 systemd[1]: Started cri-containerd-567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70.scope. Dec 13 14:29:01.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.782000 audit: BPF prog-id=158 op=LOAD Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3775 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536376462346365333837313637343061316464303663306634373463 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3775 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536376462346365333837313637343061316464303663306634373463 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit: BPF prog-id=159 op=LOAD Dec 13 14:29:01.783000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002a4d40 items=0 ppid=3775 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536376462346365333837313637343061316464303663306634373463 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit: BPF prog-id=160 op=LOAD Dec 13 14:29:01.783000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002a4d88 items=0 ppid=3775 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536376462346365333837313637343061316464303663306634373463 Dec 13 14:29:01.783000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:29:01.783000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.783000 audit: BPF prog-id=161 op=LOAD Dec 13 14:29:01.783000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002a5198 items=0 ppid=3775 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536376462346365333837313637343061316464303663306634373463 Dec 13 14:29:01.785925 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.441 [INFO][3646] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--47pvb-eth0 coredns-76f75df574- kube-system 3e04efab-3760-4c49-bbe8-e5bf7ba8fe72 866 0 2024-12-13 14:28:24 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-47pvb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibdb21ca8c33 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Namespace="kube-system" Pod="coredns-76f75df574-47pvb" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--47pvb-" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.441 [INFO][3646] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Namespace="kube-system" Pod="coredns-76f75df574-47pvb" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.512 [INFO][3711] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" HandleID="k8s-pod-network.9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.546 [INFO][3711] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" HandleID="k8s-pod-network.9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005035b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-47pvb", "timestamp":"2024-12-13 14:29:01.512317517 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.546 [INFO][3711] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.547 [INFO][3711] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.547 [INFO][3711] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.549 [INFO][3711] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" host="localhost" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.554 [INFO][3711] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.558 [INFO][3711] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.559 [INFO][3711] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.562 [INFO][3711] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.562 [INFO][3711] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" host="localhost" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.563 [INFO][3711] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3 Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.575 [INFO][3711] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" host="localhost" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.632 [INFO][3711] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" host="localhost" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.632 [INFO][3711] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" host="localhost" Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.632 [INFO][3711] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:01.786580 env[1212]: 2024-12-13 14:29:01.632 [INFO][3711] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" HandleID="k8s-pod-network.9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.787718 env[1212]: 2024-12-13 14:29:01.634 [INFO][3646] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Namespace="kube-system" Pod="coredns-76f75df574-47pvb" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--47pvb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--47pvb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3e04efab-3760-4c49-bbe8-e5bf7ba8fe72", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-47pvb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibdb21ca8c33", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:01.787718 env[1212]: 2024-12-13 14:29:01.635 [INFO][3646] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Namespace="kube-system" Pod="coredns-76f75df574-47pvb" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.787718 env[1212]: 2024-12-13 14:29:01.635 [INFO][3646] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibdb21ca8c33 ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Namespace="kube-system" Pod="coredns-76f75df574-47pvb" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.787718 env[1212]: 2024-12-13 14:29:01.639 [INFO][3646] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Namespace="kube-system" Pod="coredns-76f75df574-47pvb" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.787718 env[1212]: 2024-12-13 14:29:01.639 [INFO][3646] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Namespace="kube-system" Pod="coredns-76f75df574-47pvb" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--47pvb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--47pvb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3e04efab-3760-4c49-bbe8-e5bf7ba8fe72", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3", Pod:"coredns-76f75df574-47pvb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibdb21ca8c33", MAC:"1a:e4:64:87:9c:08", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:01.787718 env[1212]: 2024-12-13 14:29:01.780 [INFO][3646] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3" Namespace="kube-system" Pod="coredns-76f75df574-47pvb" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:01.796000 audit[3818]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:01.796000 audit[3818]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcfd2e13d0 a2=0 a3=7ffcfd2e13bc items=0 ppid=3498 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.796000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:01.811086 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2dc14e7bdb6: link becomes ready Dec 13 14:29:01.813715 systemd-networkd[1029]: cali2dc14e7bdb6: Link UP Dec 13 14:29:01.814346 systemd-networkd[1029]: cali2dc14e7bdb6: Gained carrier Dec 13 14:29:01.815117 env[1212]: time="2024-12-13T14:29:01.815024895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d54c8c5f7-s76hx,Uid:994c246b-64eb-4675-9912-f2a04673e055,Namespace:calico-system,Attempt:1,} returns sandbox id \"567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70\"" Dec 13 14:29:01.816579 env[1212]: time="2024-12-13T14:29:01.816548955Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:29:01.816777 env[1212]: time="2024-12-13T14:29:01.816710998Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:01.816877 env[1212]: time="2024-12-13T14:29:01.816751324Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:01.816877 env[1212]: time="2024-12-13T14:29:01.816764970Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:01.817024 env[1212]: time="2024-12-13T14:29:01.816924789Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3 pid=3828 runtime=io.containerd.runc.v2 Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.474 [INFO][3664] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--cm7hk-eth0 coredns-76f75df574- kube-system f79b0fce-d155-45be-9d4e-da78639b7b3e 867 0 2024-12-13 14:28:24 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-cm7hk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2dc14e7bdb6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Namespace="kube-system" Pod="coredns-76f75df574-cm7hk" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cm7hk-" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.474 [INFO][3664] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Namespace="kube-system" Pod="coredns-76f75df574-cm7hk" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.522 [INFO][3718] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" HandleID="k8s-pod-network.2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.548 [INFO][3718] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" HandleID="k8s-pod-network.2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000361070), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-cm7hk", "timestamp":"2024-12-13 14:29:01.522900654 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.548 [INFO][3718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.632 [INFO][3718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.633 [INFO][3718] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.634 [INFO][3718] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" host="localhost" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.645 [INFO][3718] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.779 [INFO][3718] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.781 [INFO][3718] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.783 [INFO][3718] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.783 [INFO][3718] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" host="localhost" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.786 [INFO][3718] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.794 [INFO][3718] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" host="localhost" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.802 [INFO][3718] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" host="localhost" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.802 [INFO][3718] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" host="localhost" Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.802 [INFO][3718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:01.828110 env[1212]: 2024-12-13 14:29:01.802 [INFO][3718] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" HandleID="k8s-pod-network.2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.829104 env[1212]: 2024-12-13 14:29:01.805 [INFO][3664] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Namespace="kube-system" Pod="coredns-76f75df574-cm7hk" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cm7hk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--cm7hk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f79b0fce-d155-45be-9d4e-da78639b7b3e", ResourceVersion:"867", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-cm7hk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2dc14e7bdb6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:01.829104 env[1212]: 2024-12-13 14:29:01.805 [INFO][3664] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Namespace="kube-system" Pod="coredns-76f75df574-cm7hk" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.829104 env[1212]: 2024-12-13 14:29:01.805 [INFO][3664] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2dc14e7bdb6 ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Namespace="kube-system" Pod="coredns-76f75df574-cm7hk" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.829104 env[1212]: 2024-12-13 14:29:01.810 [INFO][3664] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Namespace="kube-system" Pod="coredns-76f75df574-cm7hk" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.829104 env[1212]: 2024-12-13 14:29:01.811 [INFO][3664] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Namespace="kube-system" Pod="coredns-76f75df574-cm7hk" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cm7hk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--cm7hk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f79b0fce-d155-45be-9d4e-da78639b7b3e", ResourceVersion:"867", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc", Pod:"coredns-76f75df574-cm7hk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2dc14e7bdb6", MAC:"1a:cc:fd:dc:24:42", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:01.829104 env[1212]: 2024-12-13 14:29:01.822 [INFO][3664] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc" Namespace="kube-system" Pod="coredns-76f75df574-cm7hk" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:01.830000 audit[3852]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3852 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:01.830000 audit[3852]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc45bbe6d0 a2=0 a3=7ffc45bbe6bc items=0 ppid=3498 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.830000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:01.833947 systemd[1]: Started cri-containerd-9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3.scope. Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.847000 audit: BPF prog-id=162 op=LOAD Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=3828 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383833313532393962643466393033316331373564383761323231 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=3828 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383833313532393962643466393033316331373564383761323231 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit: BPF prog-id=163 op=LOAD Dec 13 14:29:01.848000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0002999f0 items=0 ppid=3828 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383833313532393962643466393033316331373564383761323231 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit: BPF prog-id=164 op=LOAD Dec 13 14:29:01.848000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000299a38 items=0 ppid=3828 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383833313532393962643466393033316331373564383761323231 Dec 13 14:29:01.848000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:29:01.848000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.848000 audit: BPF prog-id=165 op=LOAD Dec 13 14:29:01.848000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000299e48 items=0 ppid=3828 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383833313532393962643466393033316331373564383761323231 Dec 13 14:29:01.852814 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:01.857886 env[1212]: time="2024-12-13T14:29:01.857802916Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:01.858142 env[1212]: time="2024-12-13T14:29:01.857863530Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:01.858142 env[1212]: time="2024-12-13T14:29:01.857875472Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:01.858251 env[1212]: time="2024-12-13T14:29:01.858197136Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc pid=3882 runtime=io.containerd.runc.v2 Dec 13 14:29:01.874890 systemd[1]: Started cri-containerd-2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc.scope. Dec 13 14:29:01.884000 audit[3915]: NETFILTER_CFG table=filter:103 family=2 entries=34 op=nft_register_chain pid=3915 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:01.884000 audit[3915]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7fff038e6380 a2=0 a3=7fff038e636c items=0 ppid=3498 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.884000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:01.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit: BPF prog-id=166 op=LOAD Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264366364343332666565386561346638633034646462366265653466 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264366364343332666565386561346638633034646462366265653466 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit: BPF prog-id=167 op=LOAD Dec 13 14:29:01.888000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c000298500 items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264366364343332666565386561346638633034646462366265653466 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.888000 audit: BPF prog-id=168 op=LOAD Dec 13 14:29:01.888000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c000298548 items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264366364343332666565386561346638633034646462366265653466 Dec 13 14:29:01.889000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:29:01.889000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.889000 audit: BPF prog-id=169 op=LOAD Dec 13 14:29:01.889000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c000298958 items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264366364343332666565386561346638633034646462366265653466 Dec 13 14:29:01.889901 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:01.898998 env[1212]: time="2024-12-13T14:29:01.898788805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-47pvb,Uid:3e04efab-3760-4c49-bbe8-e5bf7ba8fe72,Namespace:kube-system,Attempt:1,} returns sandbox id \"9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3\"" Dec 13 14:29:01.899946 kubelet[2056]: E1213 14:29:01.899867 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:01.903012 env[1212]: time="2024-12-13T14:29:01.902963918Z" level=info msg="CreateContainer within sandbox \"9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:29:01.922205 env[1212]: time="2024-12-13T14:29:01.922156558Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cm7hk,Uid:f79b0fce-d155-45be-9d4e-da78639b7b3e,Namespace:kube-system,Attempt:1,} returns sandbox id \"2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc\"" Dec 13 14:29:01.922935 kubelet[2056]: E1213 14:29:01.922903 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:01.926538 env[1212]: time="2024-12-13T14:29:01.926506129Z" level=info msg="CreateContainer within sandbox \"2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:29:01.934823 env[1212]: time="2024-12-13T14:29:01.934775685Z" level=info msg="CreateContainer within sandbox \"9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"23cc9a4a7af5bde39d9f5451c233398f6eb07fe47b0f45625d75de30ec1c2fe2\"" Dec 13 14:29:01.935808 env[1212]: time="2024-12-13T14:29:01.935766103Z" level=info msg="StartContainer for \"23cc9a4a7af5bde39d9f5451c233398f6eb07fe47b0f45625d75de30ec1c2fe2\"" Dec 13 14:29:01.950171 env[1212]: time="2024-12-13T14:29:01.950110406Z" level=info msg="CreateContainer within sandbox \"2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0b237151b38044f9d1b76979dfb2589d6ad674e4fbc539743df81a0cd02b9553\"" Dec 13 14:29:01.951002 env[1212]: time="2024-12-13T14:29:01.950938720Z" level=info msg="StartContainer for \"0b237151b38044f9d1b76979dfb2589d6ad674e4fbc539743df81a0cd02b9553\"" Dec 13 14:29:01.960419 systemd[1]: Started cri-containerd-23cc9a4a7af5bde39d9f5451c233398f6eb07fe47b0f45625d75de30ec1c2fe2.scope. Dec 13 14:29:01.973416 systemd[1]: Started cri-containerd-0b237151b38044f9d1b76979dfb2589d6ad674e4fbc539743df81a0cd02b9553.scope. Dec 13 14:29:01.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit: BPF prog-id=170 op=LOAD Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3828 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636339613461376166356264653339643966353435316332333333 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3828 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636339613461376166356264653339643966353435316332333333 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit: BPF prog-id=171 op=LOAD Dec 13 14:29:01.981000 audit[3939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029ba30 items=0 ppid=3828 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636339613461376166356264653339643966353435316332333333 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.981000 audit: BPF prog-id=172 op=LOAD Dec 13 14:29:01.981000 audit[3939]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029ba78 items=0 ppid=3828 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636339613461376166356264653339643966353435316332333333 Dec 13 14:29:01.982000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:29:01.982000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.982000 audit: BPF prog-id=173 op=LOAD Dec 13 14:29:01.982000 audit[3939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029be88 items=0 ppid=3828 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636339613461376166356264653339643966353435316332333333 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.990000 audit: BPF prog-id=174 op=LOAD Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3882 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323337313531623338303434663964316237363937396466623235 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3882 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323337313531623338303434663964316237363937396466623235 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit: BPF prog-id=175 op=LOAD Dec 13 14:29:01.991000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000334fd0 items=0 ppid=3882 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323337313531623338303434663964316237363937396466623235 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit: BPF prog-id=176 op=LOAD Dec 13 14:29:01.991000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000335018 items=0 ppid=3882 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323337313531623338303434663964316237363937396466623235 Dec 13 14:29:01.991000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:29:01.991000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:01.991000 audit: BPF prog-id=177 op=LOAD Dec 13 14:29:01.991000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000335428 items=0 ppid=3882 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:01.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323337313531623338303434663964316237363937396466623235 Dec 13 14:29:01.999838 env[1212]: time="2024-12-13T14:29:01.999764459Z" level=info msg="StartContainer for \"23cc9a4a7af5bde39d9f5451c233398f6eb07fe47b0f45625d75de30ec1c2fe2\" returns successfully" Dec 13 14:29:02.009235 env[1212]: time="2024-12-13T14:29:02.009035873Z" level=info msg="StartContainer for \"0b237151b38044f9d1b76979dfb2589d6ad674e4fbc539743df81a0cd02b9553\" returns successfully" Dec 13 14:29:02.430687 kubelet[2056]: E1213 14:29:02.430652 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:02.432537 kubelet[2056]: E1213 14:29:02.432477 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:02.442470 kubelet[2056]: I1213 14:29:02.442410 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-cm7hk" podStartSLOduration=38.442362298 podStartE2EDuration="38.442362298s" podCreationTimestamp="2024-12-13 14:28:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:29:02.441803008 +0000 UTC m=+51.231903887" watchObservedRunningTime="2024-12-13 14:29:02.442362298 +0000 UTC m=+51.232463177" Dec 13 14:29:02.466657 kubelet[2056]: I1213 14:29:02.466599 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-47pvb" podStartSLOduration=38.466546982 podStartE2EDuration="38.466546982s" podCreationTimestamp="2024-12-13 14:28:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:29:02.466337028 +0000 UTC m=+51.256437917" watchObservedRunningTime="2024-12-13 14:29:02.466546982 +0000 UTC m=+51.256647861" Dec 13 14:29:02.483000 audit[4014]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=4014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:02.483000 audit[4014]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe01ccb550 a2=0 a3=7ffe01ccb53c items=0 ppid=2261 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:02.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:02.491000 audit[4014]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=4014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:02.491000 audit[4014]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe01ccb550 a2=0 a3=7ffe01ccb53c items=0 ppid=2261 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:02.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:02.520000 audit[4017]: NETFILTER_CFG table=filter:106 family=2 entries=10 op=nft_register_rule pid=4017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:02.520000 audit[4017]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd82809570 a2=0 a3=7ffd8280955c items=0 ppid=2261 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:02.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:02.535000 audit[4017]: NETFILTER_CFG table=nat:107 family=2 entries=56 op=nft_register_chain pid=4017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:02.535000 audit[4017]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd82809570 a2=0 a3=7ffd8280955c items=0 ppid=2261 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:02.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:02.835331 systemd-networkd[1029]: cali72c43ec3641: Gained IPv6LL Dec 13 14:29:03.219349 systemd-networkd[1029]: calibdb21ca8c33: Gained IPv6LL Dec 13 14:29:03.411225 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Dec 13 14:29:03.436558 kubelet[2056]: E1213 14:29:03.436509 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:03.436968 kubelet[2056]: E1213 14:29:03.436789 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:03.731210 systemd-networkd[1029]: cali2dc14e7bdb6: Gained IPv6LL Dec 13 14:29:04.280953 env[1212]: time="2024-12-13T14:29:04.280894552Z" level=info msg="StopPodSandbox for \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\"" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.321 [INFO][4035] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.321 [INFO][4035] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" iface="eth0" netns="/var/run/netns/cni-21939899-e6db-fc50-ba1e-ae23dcbf2ba0" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.322 [INFO][4035] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" iface="eth0" netns="/var/run/netns/cni-21939899-e6db-fc50-ba1e-ae23dcbf2ba0" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.322 [INFO][4035] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" iface="eth0" netns="/var/run/netns/cni-21939899-e6db-fc50-ba1e-ae23dcbf2ba0" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.322 [INFO][4035] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.322 [INFO][4035] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.341 [INFO][4044] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" HandleID="k8s-pod-network.1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.341 [INFO][4044] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.341 [INFO][4044] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.348 [WARNING][4044] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" HandleID="k8s-pod-network.1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.348 [INFO][4044] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" HandleID="k8s-pod-network.1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.350 [INFO][4044] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:04.353414 env[1212]: 2024-12-13 14:29:04.351 [INFO][4035] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:04.355873 systemd[1]: run-netns-cni\x2d21939899\x2de6db\x2dfc50\x2dba1e\x2dae23dcbf2ba0.mount: Deactivated successfully. Dec 13 14:29:04.357082 env[1212]: time="2024-12-13T14:29:04.357018259Z" level=info msg="TearDown network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\" successfully" Dec 13 14:29:04.357148 env[1212]: time="2024-12-13T14:29:04.357092031Z" level=info msg="StopPodSandbox for \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\" returns successfully" Dec 13 14:29:04.357909 env[1212]: time="2024-12-13T14:29:04.357868637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xj7z9,Uid:3f58d04b-d594-4e8a-bd4a-0d935f5eb68e,Namespace:calico-system,Attempt:1,}" Dec 13 14:29:04.438482 kubelet[2056]: E1213 14:29:04.438436 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:04.439019 kubelet[2056]: E1213 14:29:04.438617 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:04.503372 systemd-networkd[1029]: calidfdab3392e4: Link UP Dec 13 14:29:04.507626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:04.507680 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidfdab3392e4: link becomes ready Dec 13 14:29:04.505872 systemd-networkd[1029]: calidfdab3392e4: Gained carrier Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.407 [INFO][4053] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--xj7z9-eth0 csi-node-driver- calico-system 3f58d04b-d594-4e8a-bd4a-0d935f5eb68e 936 0 2024-12-13 14:28:31 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-xj7z9 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calidfdab3392e4 [] []}} ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Namespace="calico-system" Pod="csi-node-driver-xj7z9" WorkloadEndpoint="localhost-k8s-csi--node--driver--xj7z9-" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.407 [INFO][4053] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Namespace="calico-system" Pod="csi-node-driver-xj7z9" WorkloadEndpoint="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.452 [INFO][4066] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" HandleID="k8s-pod-network.d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.462 [INFO][4066] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" HandleID="k8s-pod-network.d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ee10), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-xj7z9", "timestamp":"2024-12-13 14:29:04.452468094 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.462 [INFO][4066] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.462 [INFO][4066] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.462 [INFO][4066] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.464 [INFO][4066] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" host="localhost" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.468 [INFO][4066] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.473 [INFO][4066] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.475 [INFO][4066] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.477 [INFO][4066] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.477 [INFO][4066] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" host="localhost" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.479 [INFO][4066] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97 Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.491 [INFO][4066] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" host="localhost" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.498 [INFO][4066] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" host="localhost" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.498 [INFO][4066] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" host="localhost" Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.498 [INFO][4066] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:04.536249 env[1212]: 2024-12-13 14:29:04.498 [INFO][4066] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" HandleID="k8s-pod-network.d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.537188 env[1212]: 2024-12-13 14:29:04.500 [INFO][4053] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Namespace="calico-system" Pod="csi-node-driver-xj7z9" WorkloadEndpoint="localhost-k8s-csi--node--driver--xj7z9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xj7z9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-xj7z9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidfdab3392e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:04.537188 env[1212]: 2024-12-13 14:29:04.500 [INFO][4053] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Namespace="calico-system" Pod="csi-node-driver-xj7z9" WorkloadEndpoint="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.537188 env[1212]: 2024-12-13 14:29:04.500 [INFO][4053] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidfdab3392e4 ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Namespace="calico-system" Pod="csi-node-driver-xj7z9" WorkloadEndpoint="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.537188 env[1212]: 2024-12-13 14:29:04.505 [INFO][4053] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Namespace="calico-system" Pod="csi-node-driver-xj7z9" WorkloadEndpoint="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.537188 env[1212]: 2024-12-13 14:29:04.506 [INFO][4053] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Namespace="calico-system" Pod="csi-node-driver-xj7z9" WorkloadEndpoint="localhost-k8s-csi--node--driver--xj7z9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xj7z9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97", Pod:"csi-node-driver-xj7z9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidfdab3392e4", MAC:"de:4a:1f:16:83:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:04.537188 env[1212]: 2024-12-13 14:29:04.534 [INFO][4053] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97" Namespace="calico-system" Pod="csi-node-driver-xj7z9" WorkloadEndpoint="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:04.544000 audit[4087]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=4087 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:04.544000 audit[4087]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffc06189af0 a2=0 a3=7ffc06189adc items=0 ppid=3498 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.544000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:04.879540 env[1212]: time="2024-12-13T14:29:04.879385828Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:04.879540 env[1212]: time="2024-12-13T14:29:04.879426277Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:04.879540 env[1212]: time="2024-12-13T14:29:04.879436185Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:04.879732 env[1212]: time="2024-12-13T14:29:04.879522050Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97 pid=4095 runtime=io.containerd.runc.v2 Dec 13 14:29:04.885855 env[1212]: time="2024-12-13T14:29:04.885817962Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:04.893592 env[1212]: time="2024-12-13T14:29:04.893534360Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:04.893811 systemd[1]: Started cri-containerd-d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97.scope. Dec 13 14:29:04.896814 env[1212]: time="2024-12-13T14:29:04.895637782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:04.898323 env[1212]: time="2024-12-13T14:29:04.898292688Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:04.898864 env[1212]: time="2024-12-13T14:29:04.898827790Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:29:04.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit: BPF prog-id=178 op=LOAD Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4095 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633866333435323234666635666566333939363561303365616630 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4095 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633866333435323234666635666566333939363561303365616630 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit: BPF prog-id=179 op=LOAD Dec 13 14:29:04.904000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a4670 items=0 ppid=4095 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633866333435323234666635666566333939363561303365616630 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit: BPF prog-id=180 op=LOAD Dec 13 14:29:04.904000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a46b8 items=0 ppid=4095 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633866333435323234666635666566333939363561303365616630 Dec 13 14:29:04.904000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:29:04.904000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.904000 audit: BPF prog-id=181 op=LOAD Dec 13 14:29:04.904000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a4ac8 items=0 ppid=4095 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633866333435323234666635666566333939363561303365616630 Dec 13 14:29:04.907693 env[1212]: time="2024-12-13T14:29:04.906695580Z" level=info msg="CreateContainer within sandbox \"567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:29:04.906680 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:04.917244 env[1212]: time="2024-12-13T14:29:04.917173549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xj7z9,Uid:3f58d04b-d594-4e8a-bd4a-0d935f5eb68e,Namespace:calico-system,Attempt:1,} returns sandbox id \"d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97\"" Dec 13 14:29:04.918964 env[1212]: time="2024-12-13T14:29:04.918927688Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:29:04.925279 env[1212]: time="2024-12-13T14:29:04.925231845Z" level=info msg="CreateContainer within sandbox \"567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"8d1ffaf26d6689633368656dc12b6853368693114d136365e31c625b9450568a\"" Dec 13 14:29:04.925669 env[1212]: time="2024-12-13T14:29:04.925645292Z" level=info msg="StartContainer for \"8d1ffaf26d6689633368656dc12b6853368693114d136365e31c625b9450568a\"" Dec 13 14:29:04.938996 systemd[1]: Started cri-containerd-8d1ffaf26d6689633368656dc12b6853368693114d136365e31c625b9450568a.scope. Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.952000 audit: BPF prog-id=182 op=LOAD Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3775 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864316666616632366436363839363333333638363536646331326236 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3775 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864316666616632366436363839363333333638363536646331326236 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit: BPF prog-id=183 op=LOAD Dec 13 14:29:04.953000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000331d40 items=0 ppid=3775 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864316666616632366436363839363333333638363536646331326236 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit: BPF prog-id=184 op=LOAD Dec 13 14:29:04.953000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000331d88 items=0 ppid=3775 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864316666616632366436363839363333333638363536646331326236 Dec 13 14:29:04.953000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:29:04.953000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:04.953000 audit: BPF prog-id=185 op=LOAD Dec 13 14:29:04.953000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003a6198 items=0 ppid=3775 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:04.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864316666616632366436363839363333333638363536646331326236 Dec 13 14:29:04.979940 env[1212]: time="2024-12-13T14:29:04.979885794Z" level=info msg="StartContainer for \"8d1ffaf26d6689633368656dc12b6853368693114d136365e31c625b9450568a\" returns successfully" Dec 13 14:29:05.453967 kubelet[2056]: I1213 14:29:05.451934 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5d54c8c5f7-s76hx" podStartSLOduration=31.368042576 podStartE2EDuration="34.451882235s" podCreationTimestamp="2024-12-13 14:28:31 +0000 UTC" firstStartedPulling="2024-12-13 14:29:01.816287194 +0000 UTC m=+50.606388073" lastFinishedPulling="2024-12-13 14:29:04.900126853 +0000 UTC m=+53.690227732" observedRunningTime="2024-12-13 14:29:05.451445103 +0000 UTC m=+54.241545992" watchObservedRunningTime="2024-12-13 14:29:05.451882235 +0000 UTC m=+54.241983114" Dec 13 14:29:06.035210 systemd-networkd[1029]: calidfdab3392e4: Gained IPv6LL Dec 13 14:29:06.371612 systemd[1]: Started sshd@13-10.0.0.115:22-10.0.0.1:33760.service. Dec 13 14:29:06.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.115:22-10.0.0.1:33760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:06.373561 kernel: kauditd_printk_skb: 961 callbacks suppressed Dec 13 14:29:06.373615 kernel: audit: type=1130 audit(1734100146.370:1270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.115:22-10.0.0.1:33760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:06.423000 audit[4186]: USER_ACCT pid=4186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.424999 sshd[4186]: Accepted publickey for core from 10.0.0.1 port 33760 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:06.426000 audit[4186]: CRED_ACQ pid=4186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.440523 kernel: audit: type=1101 audit(1734100146.423:1271): pid=4186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.440623 kernel: audit: type=1103 audit(1734100146.426:1272): pid=4186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.440662 kernel: audit: type=1006 audit(1734100146.426:1273): pid=4186 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:29:06.443240 kernel: audit: type=1300 audit(1734100146.426:1273): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc07dd4140 a2=3 a3=0 items=0 ppid=1 pid=4186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:06.426000 audit[4186]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc07dd4140 a2=3 a3=0 items=0 ppid=1 pid=4186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:06.453738 sshd[4186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:06.457096 kernel: audit: type=1327 audit(1734100146.426:1273): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:06.426000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:06.458835 systemd-logind[1203]: New session 14 of user core. Dec 13 14:29:06.459821 systemd[1]: Started session-14.scope. Dec 13 14:29:06.463000 audit[4186]: USER_START pid=4186 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.464000 audit[4188]: CRED_ACQ pid=4188 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.502335 kernel: audit: type=1105 audit(1734100146.463:1274): pid=4186 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.502379 kernel: audit: type=1103 audit(1734100146.464:1275): pid=4188 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.606791 sshd[4186]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:06.606000 audit[4186]: USER_END pid=4186 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.609205 systemd[1]: sshd@13-10.0.0.115:22-10.0.0.1:33760.service: Deactivated successfully. Dec 13 14:29:06.609978 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:29:06.610650 systemd-logind[1203]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:29:06.611463 systemd-logind[1203]: Removed session 14. Dec 13 14:29:06.606000 audit[4186]: CRED_DISP pid=4186 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.615894 kernel: audit: type=1106 audit(1734100146.606:1276): pid=4186 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.616011 kernel: audit: type=1104 audit(1734100146.606:1277): pid=4186 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:06.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.115:22-10.0.0.1:33760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:07.008217 env[1212]: time="2024-12-13T14:29:07.008108899Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:07.010134 env[1212]: time="2024-12-13T14:29:07.010076001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:07.011771 env[1212]: time="2024-12-13T14:29:07.011716024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:07.013584 env[1212]: time="2024-12-13T14:29:07.013550301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:07.014141 env[1212]: time="2024-12-13T14:29:07.014096581Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:29:07.016216 env[1212]: time="2024-12-13T14:29:07.016167873Z" level=info msg="CreateContainer within sandbox \"d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:29:07.033486 env[1212]: time="2024-12-13T14:29:07.033418331Z" level=info msg="CreateContainer within sandbox \"d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"95343e1334c487fe28feae120c9d8f6e7d3d176e95c95d2455e36b2eef04d896\"" Dec 13 14:29:07.033992 env[1212]: time="2024-12-13T14:29:07.033971334Z" level=info msg="StartContainer for \"95343e1334c487fe28feae120c9d8f6e7d3d176e95c95d2455e36b2eef04d896\"" Dec 13 14:29:07.058829 systemd[1]: Started cri-containerd-95343e1334c487fe28feae120c9d8f6e7d3d176e95c95d2455e36b2eef04d896.scope. Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe3b5e049b8 items=0 ppid=4095 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:07.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935333433653133333463343837666532386665616531323063396438 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit: BPF prog-id=186 op=LOAD Dec 13 14:29:07.069000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002f6618 items=0 ppid=4095 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:07.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935333433653133333463343837666532386665616531323063396438 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit: BPF prog-id=187 op=LOAD Dec 13 14:29:07.069000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002f6668 items=0 ppid=4095 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:07.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935333433653133333463343837666532386665616531323063396438 Dec 13 14:29:07.069000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:29:07.069000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:07.069000 audit: BPF prog-id=188 op=LOAD Dec 13 14:29:07.069000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002f66f8 items=0 ppid=4095 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:07.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935333433653133333463343837666532386665616531323063396438 Dec 13 14:29:07.084105 env[1212]: time="2024-12-13T14:29:07.083422301Z" level=info msg="StartContainer for \"95343e1334c487fe28feae120c9d8f6e7d3d176e95c95d2455e36b2eef04d896\" returns successfully" Dec 13 14:29:07.085236 env[1212]: time="2024-12-13T14:29:07.085185903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:29:07.831000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:07.831000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ce5ef0 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:29:07.831000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:07.831000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:07.831000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002aa4340 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:29:07.831000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:07.937000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:07.937000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:07.937000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0068bda70 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:29:07.937000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:07.937000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:07.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:07.937000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009e787e0 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:29:07.937000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00ad8cd50 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:29:07.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:07.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:07.937000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0034f7dc0 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:29:07.937000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:07.939000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:07.939000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0034f7de0 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:29:07.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:07.939000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:07.939000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009e78bd0 a2=fc6 a3=0 items=0 ppid=1761 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c363,c815 key=(null) Dec 13 14:29:07.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313135002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:08.280560 env[1212]: time="2024-12-13T14:29:08.280484320Z" level=info msg="StopPodSandbox for \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\"" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.352 [INFO][4271] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.353 [INFO][4271] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" iface="eth0" netns="/var/run/netns/cni-2d5657c9-8f6c-69f4-636d-db4cfd09b09d" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.353 [INFO][4271] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" iface="eth0" netns="/var/run/netns/cni-2d5657c9-8f6c-69f4-636d-db4cfd09b09d" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.353 [INFO][4271] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" iface="eth0" netns="/var/run/netns/cni-2d5657c9-8f6c-69f4-636d-db4cfd09b09d" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.353 [INFO][4271] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.353 [INFO][4271] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.383 [INFO][4284] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" HandleID="k8s-pod-network.434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.383 [INFO][4284] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.383 [INFO][4284] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.389 [WARNING][4284] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" HandleID="k8s-pod-network.434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.389 [INFO][4284] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" HandleID="k8s-pod-network.434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.390 [INFO][4284] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:08.394356 env[1212]: 2024-12-13 14:29:08.392 [INFO][4271] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:08.395686 kubelet[2056]: E1213 14:29:08.395665 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:08.397288 systemd[1]: run-netns-cni\x2d2d5657c9\x2d8f6c\x2d69f4\x2d636d\x2ddb4cfd09b09d.mount: Deactivated successfully. Dec 13 14:29:08.398962 env[1212]: time="2024-12-13T14:29:08.398913736Z" level=info msg="TearDown network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\" successfully" Dec 13 14:29:08.398962 env[1212]: time="2024-12-13T14:29:08.398958723Z" level=info msg="StopPodSandbox for \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\" returns successfully" Dec 13 14:29:08.400009 env[1212]: time="2024-12-13T14:29:08.399962040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b476db8c-2fnt7,Uid:947af00f-f596-478c-aa97-e03974cea6ab,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:29:08.531474 systemd-networkd[1029]: cali3fa635c22dc: Link UP Dec 13 14:29:08.534537 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:08.535314 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3fa635c22dc: link becomes ready Dec 13 14:29:08.534797 systemd-networkd[1029]: cali3fa635c22dc: Gained carrier Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.458 [INFO][4292] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0 calico-apiserver-5b476db8c- calico-apiserver 947af00f-f596-478c-aa97-e03974cea6ab 966 0 2024-12-13 14:28:30 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5b476db8c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5b476db8c-2fnt7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3fa635c22dc [] []}} ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-2fnt7" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.458 [INFO][4292] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-2fnt7" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.488 [INFO][4306] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" HandleID="k8s-pod-network.1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.497 [INFO][4306] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" HandleID="k8s-pod-network.1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ddf30), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5b476db8c-2fnt7", "timestamp":"2024-12-13 14:29:08.488443947 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.497 [INFO][4306] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.497 [INFO][4306] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.497 [INFO][4306] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.499 [INFO][4306] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" host="localhost" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.503 [INFO][4306] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.507 [INFO][4306] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.508 [INFO][4306] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.511 [INFO][4306] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.511 [INFO][4306] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" host="localhost" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.512 [INFO][4306] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.516 [INFO][4306] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" host="localhost" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.522 [INFO][4306] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" host="localhost" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.523 [INFO][4306] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" host="localhost" Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.523 [INFO][4306] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:08.546587 env[1212]: 2024-12-13 14:29:08.523 [INFO][4306] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" HandleID="k8s-pod-network.1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.547439 env[1212]: 2024-12-13 14:29:08.529 [INFO][4292] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-2fnt7" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0", GenerateName:"calico-apiserver-5b476db8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"947af00f-f596-478c-aa97-e03974cea6ab", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b476db8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5b476db8c-2fnt7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3fa635c22dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:08.547439 env[1212]: 2024-12-13 14:29:08.529 [INFO][4292] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-2fnt7" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.547439 env[1212]: 2024-12-13 14:29:08.529 [INFO][4292] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3fa635c22dc ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-2fnt7" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.547439 env[1212]: 2024-12-13 14:29:08.535 [INFO][4292] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-2fnt7" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.547439 env[1212]: 2024-12-13 14:29:08.535 [INFO][4292] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-2fnt7" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0", GenerateName:"calico-apiserver-5b476db8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"947af00f-f596-478c-aa97-e03974cea6ab", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b476db8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba", Pod:"calico-apiserver-5b476db8c-2fnt7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3fa635c22dc", MAC:"46:d3:00:7e:93:44", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:08.547439 env[1212]: 2024-12-13 14:29:08.543 [INFO][4292] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-2fnt7" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:08.559000 audit[4329]: NETFILTER_CFG table=filter:109 family=2 entries=56 op=nft_register_chain pid=4329 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:08.559000 audit[4329]: SYSCALL arch=c000003e syscall=46 success=yes exit=28244 a0=3 a1=7ffcdd1c32e0 a2=0 a3=7ffcdd1c32cc items=0 ppid=3498 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:08.559000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:08.566211 env[1212]: time="2024-12-13T14:29:08.566117407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:08.566211 env[1212]: time="2024-12-13T14:29:08.566169887Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:08.566486 env[1212]: time="2024-12-13T14:29:08.566184215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:08.566486 env[1212]: time="2024-12-13T14:29:08.566391072Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba pid=4336 runtime=io.containerd.runc.v2 Dec 13 14:29:08.588585 systemd[1]: Started cri-containerd-1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba.scope. Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.604000 audit: BPF prog-id=189 op=LOAD Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4336 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:08.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165373430356236373932313834653830363336343734373634653866 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4336 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:08.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165373430356236373932313834653830363336343734373634653866 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit: BPF prog-id=190 op=LOAD Dec 13 14:29:08.605000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000253bd0 items=0 ppid=4336 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:08.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165373430356236373932313834653830363336343734373634653866 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit: BPF prog-id=191 op=LOAD Dec 13 14:29:08.605000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000253c18 items=0 ppid=4336 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:08.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165373430356236373932313834653830363336343734373634653866 Dec 13 14:29:08.605000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:29:08.605000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:08.605000 audit: BPF prog-id=192 op=LOAD Dec 13 14:29:08.605000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b8028 items=0 ppid=4336 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:08.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165373430356236373932313834653830363336343734373634653866 Dec 13 14:29:08.607698 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:08.617476 env[1212]: time="2024-12-13T14:29:08.617395259Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:08.621188 env[1212]: time="2024-12-13T14:29:08.621138813Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:08.624703 env[1212]: time="2024-12-13T14:29:08.624658846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:08.627243 env[1212]: time="2024-12-13T14:29:08.627209797Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:08.628014 env[1212]: time="2024-12-13T14:29:08.627713665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:29:08.632394 env[1212]: time="2024-12-13T14:29:08.631801270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b476db8c-2fnt7,Uid:947af00f-f596-478c-aa97-e03974cea6ab,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba\"" Dec 13 14:29:08.632620 env[1212]: time="2024-12-13T14:29:08.632579494Z" level=info msg="CreateContainer within sandbox \"d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:29:08.634173 env[1212]: time="2024-12-13T14:29:08.634136736Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:29:09.030973 env[1212]: time="2024-12-13T14:29:09.030900638Z" level=info msg="CreateContainer within sandbox \"d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e61bcaecd9b7410b41107837d2cad52d252a8e37e8279956a7ea081eec4f1fee\"" Dec 13 14:29:09.031707 env[1212]: time="2024-12-13T14:29:09.031661038Z" level=info msg="StartContainer for \"e61bcaecd9b7410b41107837d2cad52d252a8e37e8279956a7ea081eec4f1fee\"" Dec 13 14:29:09.049333 systemd[1]: Started cri-containerd-e61bcaecd9b7410b41107837d2cad52d252a8e37e8279956a7ea081eec4f1fee.scope. Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff4a0676a88 items=0 ppid=4095 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:09.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536316263616563643962373431306234313130373833376432636164 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit: BPF prog-id=193 op=LOAD Dec 13 14:29:09.064000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00030cda8 items=0 ppid=4095 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:09.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536316263616563643962373431306234313130373833376432636164 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit: BPF prog-id=194 op=LOAD Dec 13 14:29:09.064000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00030cdf8 items=0 ppid=4095 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:09.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536316263616563643962373431306234313130373833376432636164 Dec 13 14:29:09.064000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:29:09.064000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:09.064000 audit: BPF prog-id=195 op=LOAD Dec 13 14:29:09.064000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00030ce88 items=0 ppid=4095 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:09.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536316263616563643962373431306234313130373833376432636164 Dec 13 14:29:09.179137 env[1212]: time="2024-12-13T14:29:09.179039050Z" level=info msg="StartContainer for \"e61bcaecd9b7410b41107837d2cad52d252a8e37e8279956a7ea081eec4f1fee\" returns successfully" Dec 13 14:29:09.279801 systemd[1]: run-containerd-runc-k8s.io-1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba-runc.nzuXmD.mount: Deactivated successfully. Dec 13 14:29:09.374750 kubelet[2056]: I1213 14:29:09.374638 2056 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:29:09.379865 kubelet[2056]: I1213 14:29:09.379837 2056 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:29:10.134511 systemd-networkd[1029]: cali3fa635c22dc: Gained IPv6LL Dec 13 14:29:11.271975 env[1212]: time="2024-12-13T14:29:11.271911130Z" level=info msg="StopPodSandbox for \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\"" Dec 13 14:29:11.282276 env[1212]: time="2024-12-13T14:29:11.282215241Z" level=info msg="StopPodSandbox for \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\"" Dec 13 14:29:11.556695 kubelet[2056]: I1213 14:29:11.556341 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xj7z9" podStartSLOduration=36.846372923 podStartE2EDuration="40.556263584s" podCreationTimestamp="2024-12-13 14:28:31 +0000 UTC" firstStartedPulling="2024-12-13 14:29:04.918590018 +0000 UTC m=+53.708690897" lastFinishedPulling="2024-12-13 14:29:08.628480679 +0000 UTC m=+57.418581558" observedRunningTime="2024-12-13 14:29:09.564573687 +0000 UTC m=+58.354674587" watchObservedRunningTime="2024-12-13 14:29:11.556263584 +0000 UTC m=+60.346364463" Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.463 [WARNING][4429] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--cm7hk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f79b0fce-d155-45be-9d4e-da78639b7b3e", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc", Pod:"coredns-76f75df574-cm7hk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2dc14e7bdb6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.464 [INFO][4429] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.464 [INFO][4429] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" iface="eth0" netns="" Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.464 [INFO][4429] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.464 [INFO][4429] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.484 [INFO][4468] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" HandleID="k8s-pod-network.7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.484 [INFO][4468] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.485 [INFO][4468] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.555 [WARNING][4468] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" HandleID="k8s-pod-network.7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.555 [INFO][4468] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" HandleID="k8s-pod-network.7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.601 [INFO][4468] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:11.607000 env[1212]: 2024-12-13 14:29:11.603 [INFO][4429] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:11.608164 env[1212]: time="2024-12-13T14:29:11.607078673Z" level=info msg="TearDown network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\" successfully" Dec 13 14:29:11.608164 env[1212]: time="2024-12-13T14:29:11.607118489Z" level=info msg="StopPodSandbox for \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\" returns successfully" Dec 13 14:29:11.608553 env[1212]: time="2024-12-13T14:29:11.608384387Z" level=info msg="RemovePodSandbox for \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\"" Dec 13 14:29:11.608676 env[1212]: time="2024-12-13T14:29:11.608597997Z" level=info msg="Forcibly stopping sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\"" Dec 13 14:29:11.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.115:22-10.0.0.1:44224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:11.614250 systemd[1]: Started sshd@14-10.0.0.115:22-10.0.0.1:44224.service. Dec 13 14:29:11.615746 kernel: kauditd_printk_skb: 171 callbacks suppressed Dec 13 14:29:11.615846 kernel: audit: type=1130 audit(1734100151.613:1318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.115:22-10.0.0.1:44224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.557 [INFO][4457] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.557 [INFO][4457] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" iface="eth0" netns="/var/run/netns/cni-12049cc9-bf18-a9fc-e23e-31a40e0ffed6" Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.557 [INFO][4457] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" iface="eth0" netns="/var/run/netns/cni-12049cc9-bf18-a9fc-e23e-31a40e0ffed6" Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.557 [INFO][4457] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" iface="eth0" netns="/var/run/netns/cni-12049cc9-bf18-a9fc-e23e-31a40e0ffed6" Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.557 [INFO][4457] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.558 [INFO][4457] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.586 [INFO][4476] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" HandleID="k8s-pod-network.c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Workload="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.586 [INFO][4476] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.601 [INFO][4476] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.607 [WARNING][4476] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" HandleID="k8s-pod-network.c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Workload="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.607 [INFO][4476] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" HandleID="k8s-pod-network.c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Workload="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.611 [INFO][4476] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:11.634905 env[1212]: 2024-12-13 14:29:11.625 [INFO][4457] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a" Dec 13 14:29:11.635720 env[1212]: time="2024-12-13T14:29:11.635683118Z" level=info msg="TearDown network for sandbox \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\" successfully" Dec 13 14:29:11.635805 env[1212]: time="2024-12-13T14:29:11.635783280Z" level=info msg="StopPodSandbox for \"c220b41cada850644d803b0da6e186908a668e8abafd274762f51dba84cdab1a\" returns successfully" Dec 13 14:29:11.636513 env[1212]: time="2024-12-13T14:29:11.636494073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b476db8c-kglgd,Uid:cc5c46ef-a360-454e-99a7-a2960943388e,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:29:11.639254 systemd[1]: run-netns-cni\x2d12049cc9\x2dbf18\x2da9fc\x2de23e\x2d31a40e0ffed6.mount: Deactivated successfully. Dec 13 14:29:11.670000 audit[4490]: USER_ACCT pid=4490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.671472 sshd[4490]: Accepted publickey for core from 10.0.0.1 port 44224 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:11.675000 audit[4490]: CRED_ACQ pid=4490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.677228 sshd[4490]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:11.681401 kernel: audit: type=1101 audit(1734100151.670:1319): pid=4490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.681475 kernel: audit: type=1103 audit(1734100151.675:1320): pid=4490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.685587 kernel: audit: type=1006 audit(1734100151.675:1321): pid=4490 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:29:11.691175 kernel: audit: type=1300 audit(1734100151.675:1321): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb100fc40 a2=3 a3=0 items=0 ppid=1 pid=4490 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.675000 audit[4490]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb100fc40 a2=3 a3=0 items=0 ppid=1 pid=4490 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.687981 systemd[1]: Started session-15.scope. Dec 13 14:29:11.688481 systemd-logind[1203]: New session 15 of user core. Dec 13 14:29:11.675000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:11.694081 kernel: audit: type=1327 audit(1734100151.675:1321): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:11.693000 audit[4490]: USER_START pid=4490 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.697000 audit[4519]: CRED_ACQ pid=4519 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.704400 kernel: audit: type=1105 audit(1734100151.693:1322): pid=4490 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.704442 kernel: audit: type=1103 audit(1734100151.697:1323): pid=4519 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.669 [WARNING][4503] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--cm7hk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f79b0fce-d155-45be-9d4e-da78639b7b3e", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2d6cd432fee8ea4f8c04ddb6bee4faf869a199ca74a4acc89f8b02c9d15c00fc", Pod:"coredns-76f75df574-cm7hk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2dc14e7bdb6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.669 [INFO][4503] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.669 [INFO][4503] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" iface="eth0" netns="" Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.669 [INFO][4503] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.669 [INFO][4503] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.707 [INFO][4512] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" HandleID="k8s-pod-network.7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.708 [INFO][4512] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.708 [INFO][4512] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.716 [WARNING][4512] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" HandleID="k8s-pod-network.7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.716 [INFO][4512] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" HandleID="k8s-pod-network.7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Workload="localhost-k8s-coredns--76f75df574--cm7hk-eth0" Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.717 [INFO][4512] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:11.720922 env[1212]: 2024-12-13 14:29:11.719 [INFO][4503] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941" Dec 13 14:29:11.721366 env[1212]: time="2024-12-13T14:29:11.720970525Z" level=info msg="TearDown network for sandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\" successfully" Dec 13 14:29:11.855836 sshd[4490]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:11.855000 audit[4490]: USER_END pid=4490 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.858386 systemd[1]: sshd@14-10.0.0.115:22-10.0.0.1:44224.service: Deactivated successfully. Dec 13 14:29:11.859440 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:29:11.860230 systemd-logind[1203]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:29:11.861169 systemd-logind[1203]: Removed session 15. Dec 13 14:29:11.855000 audit[4490]: CRED_DISP pid=4490 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.865469 kernel: audit: type=1106 audit(1734100151.855:1324): pid=4490 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.865566 kernel: audit: type=1104 audit(1734100151.855:1325): pid=4490 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:11.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.115:22-10.0.0.1:44224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:11.922432 env[1212]: time="2024-12-13T14:29:11.922340443Z" level=info msg="RemovePodSandbox \"7001fbf679761a52e9464c9c83a57d2e33f6e30d2c93da7029d704eb16dce941\" returns successfully" Dec 13 14:29:11.923236 env[1212]: time="2024-12-13T14:29:11.923187828Z" level=info msg="StopPodSandbox for \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\"" Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.955 [WARNING][4552] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--47pvb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3e04efab-3760-4c49-bbe8-e5bf7ba8fe72", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3", Pod:"coredns-76f75df574-47pvb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibdb21ca8c33", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.955 [INFO][4552] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.955 [INFO][4552] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" iface="eth0" netns="" Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.955 [INFO][4552] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.955 [INFO][4552] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.993 [INFO][4559] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" HandleID="k8s-pod-network.959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.993 [INFO][4559] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.993 [INFO][4559] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.999 [WARNING][4559] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" HandleID="k8s-pod-network.959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:11.999 [INFO][4559] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" HandleID="k8s-pod-network.959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:12.000 [INFO][4559] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:12.003305 env[1212]: 2024-12-13 14:29:12.002 [INFO][4552] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:12.003791 env[1212]: time="2024-12-13T14:29:12.003347428Z" level=info msg="TearDown network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\" successfully" Dec 13 14:29:12.003791 env[1212]: time="2024-12-13T14:29:12.003392294Z" level=info msg="StopPodSandbox for \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\" returns successfully" Dec 13 14:29:12.004030 env[1212]: time="2024-12-13T14:29:12.003984289Z" level=info msg="RemovePodSandbox for \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\"" Dec 13 14:29:12.004233 env[1212]: time="2024-12-13T14:29:12.004030808Z" level=info msg="Forcibly stopping sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\"" Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.058 [WARNING][4582] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--47pvb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"3e04efab-3760-4c49-bbe8-e5bf7ba8fe72", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9888315299bd4f9031c175d87a221550871b823dc3c54427c0035c73bda13bc3", Pod:"coredns-76f75df574-47pvb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibdb21ca8c33", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.059 [INFO][4582] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.059 [INFO][4582] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" iface="eth0" netns="" Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.059 [INFO][4582] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.059 [INFO][4582] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.081 [INFO][4589] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" HandleID="k8s-pod-network.959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.081 [INFO][4589] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.081 [INFO][4589] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.086 [WARNING][4589] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" HandleID="k8s-pod-network.959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.086 [INFO][4589] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" HandleID="k8s-pod-network.959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Workload="localhost-k8s-coredns--76f75df574--47pvb-eth0" Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.087 [INFO][4589] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:12.090639 env[1212]: 2024-12-13 14:29:12.089 [INFO][4582] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df" Dec 13 14:29:12.091263 env[1212]: time="2024-12-13T14:29:12.090677903Z" level=info msg="TearDown network for sandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\" successfully" Dec 13 14:29:12.385683 env[1212]: time="2024-12-13T14:29:12.385632661Z" level=info msg="RemovePodSandbox \"959c4e3efd15120057982b135af6d45f89e62606b25eb016936aba0a0e7f82df\" returns successfully" Dec 13 14:29:12.387250 env[1212]: time="2024-12-13T14:29:12.386708524Z" level=info msg="StopPodSandbox for \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\"" Dec 13 14:29:12.578236 systemd-networkd[1029]: cali34b67de6aca: Link UP Dec 13 14:29:12.580473 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:12.580576 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali34b67de6aca: link becomes ready Dec 13 14:29:12.580824 systemd-networkd[1029]: cali34b67de6aca: Gained carrier Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.327 [INFO][4597] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0 calico-apiserver-5b476db8c- calico-apiserver cc5c46ef-a360-454e-99a7-a2960943388e 1006 0 2024-12-13 14:28:31 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5b476db8c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5b476db8c-kglgd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali34b67de6aca [] []}} ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-kglgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--kglgd-" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.328 [INFO][4597] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-kglgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.373 [INFO][4610] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" HandleID="k8s-pod-network.6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Workload="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.381 [INFO][4610] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" HandleID="k8s-pod-network.6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Workload="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f5df0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5b476db8c-kglgd", "timestamp":"2024-12-13 14:29:12.373263245 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.381 [INFO][4610] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.381 [INFO][4610] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.381 [INFO][4610] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.382 [INFO][4610] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" host="localhost" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.386 [INFO][4610] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.391 [INFO][4610] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.393 [INFO][4610] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.395 [INFO][4610] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.395 [INFO][4610] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" host="localhost" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.397 [INFO][4610] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704 Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.416 [INFO][4610] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" host="localhost" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.574 [INFO][4610] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" host="localhost" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.574 [INFO][4610] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" host="localhost" Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.574 [INFO][4610] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:12.647400 env[1212]: 2024-12-13 14:29:12.574 [INFO][4610] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" HandleID="k8s-pod-network.6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Workload="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:12.648172 env[1212]: 2024-12-13 14:29:12.576 [INFO][4597] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-kglgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0", GenerateName:"calico-apiserver-5b476db8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"cc5c46ef-a360-454e-99a7-a2960943388e", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b476db8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5b476db8c-kglgd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali34b67de6aca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:12.648172 env[1212]: 2024-12-13 14:29:12.576 [INFO][4597] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-kglgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:12.648172 env[1212]: 2024-12-13 14:29:12.576 [INFO][4597] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali34b67de6aca ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-kglgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:12.648172 env[1212]: 2024-12-13 14:29:12.580 [INFO][4597] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-kglgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:12.648172 env[1212]: 2024-12-13 14:29:12.581 [INFO][4597] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-kglgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0", GenerateName:"calico-apiserver-5b476db8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"cc5c46ef-a360-454e-99a7-a2960943388e", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b476db8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704", Pod:"calico-apiserver-5b476db8c-kglgd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali34b67de6aca", MAC:"ba:89:cf:de:a3:19", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:12.648172 env[1212]: 2024-12-13 14:29:12.645 [INFO][4597] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704" Namespace="calico-apiserver" Pod="calico-apiserver-5b476db8c-kglgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b476db8c--kglgd-eth0" Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.573 [WARNING][4632] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xj7z9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97", Pod:"csi-node-driver-xj7z9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidfdab3392e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.574 [INFO][4632] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.574 [INFO][4632] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" iface="eth0" netns="" Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.574 [INFO][4632] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.574 [INFO][4632] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.595 [INFO][4641] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" HandleID="k8s-pod-network.1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.596 [INFO][4641] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.596 [INFO][4641] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.644 [WARNING][4641] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" HandleID="k8s-pod-network.1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.644 [INFO][4641] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" HandleID="k8s-pod-network.1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.646 [INFO][4641] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:12.649020 env[1212]: 2024-12-13 14:29:12.647 [INFO][4632] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:12.649383 env[1212]: time="2024-12-13T14:29:12.649072450Z" level=info msg="TearDown network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\" successfully" Dec 13 14:29:12.649383 env[1212]: time="2024-12-13T14:29:12.649102147Z" level=info msg="StopPodSandbox for \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\" returns successfully" Dec 13 14:29:12.649791 env[1212]: time="2024-12-13T14:29:12.649733718Z" level=info msg="RemovePodSandbox for \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\"" Dec 13 14:29:12.649947 env[1212]: time="2024-12-13T14:29:12.649789534Z" level=info msg="Forcibly stopping sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\"" Dec 13 14:29:12.654000 audit[4669]: NETFILTER_CFG table=filter:110 family=2 entries=56 op=nft_register_chain pid=4669 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:12.654000 audit[4669]: SYSCALL arch=c000003e syscall=46 success=yes exit=27932 a0=3 a1=7ffcd512b9b0 a2=0 a3=7ffcd512b99c items=0 ppid=3498 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.654000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:12.657304 env[1212]: time="2024-12-13T14:29:12.657235566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:12.671596 env[1212]: time="2024-12-13T14:29:12.671532136Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:12.681455 env[1212]: time="2024-12-13T14:29:12.681376623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:12.681655 env[1212]: time="2024-12-13T14:29:12.681522042Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:12.681655 env[1212]: time="2024-12-13T14:29:12.681542791Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:12.683210 env[1212]: time="2024-12-13T14:29:12.682689911Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704 pid=4695 runtime=io.containerd.runc.v2 Dec 13 14:29:12.714374 systemd[1]: run-containerd-runc-k8s.io-6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704-runc.FHLWPC.mount: Deactivated successfully. Dec 13 14:29:12.718193 systemd[1]: Started cri-containerd-6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704.scope. Dec 13 14:29:12.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit: BPF prog-id=196 op=LOAD Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4695 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363865353439343163393233623330316334623865323331663734 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4695 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363865353439343163393233623330316334623865323331663734 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.728000 audit: BPF prog-id=197 op=LOAD Dec 13 14:29:12.728000 audit[4705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000218380 items=0 ppid=4695 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363865353439343163393233623330316334623865323331663734 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit: BPF prog-id=198 op=LOAD Dec 13 14:29:12.729000 audit[4705]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002183c8 items=0 ppid=4695 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363865353439343163393233623330316334623865323331663734 Dec 13 14:29:12.729000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:29:12.729000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { perfmon } for pid=4705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit[4705]: AVC avc: denied { bpf } for pid=4705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.729000 audit: BPF prog-id=199 op=LOAD Dec 13 14:29:12.729000 audit[4705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002187d8 items=0 ppid=4695 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363865353439343163393233623330316334623865323331663734 Dec 13 14:29:12.731234 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.689 [WARNING][4681] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xj7z9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3f58d04b-d594-4e8a-bd4a-0d935f5eb68e", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d4c8f345224ff5fef39965a03eaf0f1d4ef398db15983992e77a9f2293908e97", Pod:"csi-node-driver-xj7z9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidfdab3392e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.689 [INFO][4681] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.689 [INFO][4681] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" iface="eth0" netns="" Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.689 [INFO][4681] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.689 [INFO][4681] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.737 [INFO][4706] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" HandleID="k8s-pod-network.1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.738 [INFO][4706] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.738 [INFO][4706] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.746 [WARNING][4706] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" HandleID="k8s-pod-network.1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.746 [INFO][4706] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" HandleID="k8s-pod-network.1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Workload="localhost-k8s-csi--node--driver--xj7z9-eth0" Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.748 [INFO][4706] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:12.751625 env[1212]: 2024-12-13 14:29:12.750 [INFO][4681] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9" Dec 13 14:29:12.752240 env[1212]: time="2024-12-13T14:29:12.751657772Z" level=info msg="TearDown network for sandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\" successfully" Dec 13 14:29:12.757815 env[1212]: time="2024-12-13T14:29:12.757757422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b476db8c-kglgd,Uid:cc5c46ef-a360-454e-99a7-a2960943388e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704\"" Dec 13 14:29:12.761156 env[1212]: time="2024-12-13T14:29:12.761117762Z" level=info msg="CreateContainer within sandbox \"6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:29:12.777077 env[1212]: time="2024-12-13T14:29:12.776997186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:12.924796 env[1212]: time="2024-12-13T14:29:12.924631757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:12.925400 env[1212]: time="2024-12-13T14:29:12.925306460Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:29:12.926890 env[1212]: time="2024-12-13T14:29:12.926852273Z" level=info msg="RemovePodSandbox \"1131f1c098e6abdfac99857a3feb6b355009f208a9cc4d5a3a84c38da66a42f9\" returns successfully" Dec 13 14:29:12.928354 env[1212]: time="2024-12-13T14:29:12.928311740Z" level=info msg="StopPodSandbox for \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\"" Dec 13 14:29:12.934957 env[1212]: time="2024-12-13T14:29:12.934908212Z" level=info msg="CreateContainer within sandbox \"1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:29:12.951822 env[1212]: time="2024-12-13T14:29:12.951782503Z" level=info msg="CreateContainer within sandbox \"6068e54941c923b301c4b8e231f74a5145712b9b75ecaf2aeda80d8805076704\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0a61f37d9457eb953cef82ee5d7295f902e8cc9f3e001cb0c6d6b3426a46fe0e\"" Dec 13 14:29:12.953928 env[1212]: time="2024-12-13T14:29:12.953007160Z" level=info msg="StartContainer for \"0a61f37d9457eb953cef82ee5d7295f902e8cc9f3e001cb0c6d6b3426a46fe0e\"" Dec 13 14:29:12.960802 env[1212]: time="2024-12-13T14:29:12.960746513Z" level=info msg="CreateContainer within sandbox \"1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"cbbdd5a77a1bdc99ab5bc3eeefe013394c3075c6af5c71bced20893bd30f23c4\"" Dec 13 14:29:12.961761 env[1212]: time="2024-12-13T14:29:12.961736802Z" level=info msg="StartContainer for \"cbbdd5a77a1bdc99ab5bc3eeefe013394c3075c6af5c71bced20893bd30f23c4\"" Dec 13 14:29:12.973435 systemd[1]: Started cri-containerd-0a61f37d9457eb953cef82ee5d7295f902e8cc9f3e001cb0c6d6b3426a46fe0e.scope. Dec 13 14:29:12.987479 systemd[1]: Started cri-containerd-cbbdd5a77a1bdc99ab5bc3eeefe013394c3075c6af5c71bced20893bd30f23c4.scope. Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.990000 audit: BPF prog-id=200 op=LOAD Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4695 pid=4770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363166333764393435376562393533636566383265653564373239 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4695 pid=4770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363166333764393435376562393533636566383265653564373239 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit: BPF prog-id=201 op=LOAD Dec 13 14:29:12.991000 audit[4770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00021a680 items=0 ppid=4695 pid=4770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363166333764393435376562393533636566383265653564373239 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit: BPF prog-id=202 op=LOAD Dec 13 14:29:12.991000 audit[4770]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00021a6c8 items=0 ppid=4695 pid=4770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363166333764393435376562393533636566383265653564373239 Dec 13 14:29:12.991000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:29:12.991000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { perfmon } for pid=4770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit[4770]: AVC avc: denied { bpf } for pid=4770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.991000 audit: BPF prog-id=203 op=LOAD Dec 13 14:29:12.991000 audit[4770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00021aad8 items=0 ppid=4695 pid=4770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363166333764393435376562393533636566383265653564373239 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.002000 audit: BPF prog-id=204 op=LOAD Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4336 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626464356137376131626463393961623562633365656566653031 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4336 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626464356137376131626463393961623562633365656566653031 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit: BPF prog-id=205 op=LOAD Dec 13 14:29:13.003000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a09c0 items=0 ppid=4336 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626464356137376131626463393961623562633365656566653031 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit: BPF prog-id=206 op=LOAD Dec 13 14:29:13.003000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a0a08 items=0 ppid=4336 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626464356137376131626463393961623562633365656566653031 Dec 13 14:29:13.003000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:29:13.003000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:13.003000 audit: BPF prog-id=207 op=LOAD Dec 13 14:29:13.003000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a0e18 items=0 ppid=4336 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626464356137376131626463393961623562633365656566653031 Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:12.970 [WARNING][4755] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0", GenerateName:"calico-kube-controllers-5d54c8c5f7-", Namespace:"calico-system", SelfLink:"", UID:"994c246b-64eb-4675-9912-f2a04673e055", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d54c8c5f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70", Pod:"calico-kube-controllers-5d54c8c5f7-s76hx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali72c43ec3641", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:12.970 [INFO][4755] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:12.970 [INFO][4755] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" iface="eth0" netns="" Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:12.970 [INFO][4755] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:12.970 [INFO][4755] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:13.010 [INFO][4789] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" HandleID="k8s-pod-network.0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:13.010 [INFO][4789] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:13.010 [INFO][4789] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:13.018 [WARNING][4789] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" HandleID="k8s-pod-network.0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:13.018 [INFO][4789] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" HandleID="k8s-pod-network.0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:13.020 [INFO][4789] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:13.024023 env[1212]: 2024-12-13 14:29:13.021 [INFO][4755] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:13.024697 env[1212]: time="2024-12-13T14:29:13.024660532Z" level=info msg="TearDown network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\" successfully" Dec 13 14:29:13.024820 env[1212]: time="2024-12-13T14:29:13.024799950Z" level=info msg="StopPodSandbox for \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\" returns successfully" Dec 13 14:29:13.026030 env[1212]: time="2024-12-13T14:29:13.026010257Z" level=info msg="RemovePodSandbox for \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\"" Dec 13 14:29:13.026206 env[1212]: time="2024-12-13T14:29:13.026151137Z" level=info msg="Forcibly stopping sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\"" Dec 13 14:29:13.114357 env[1212]: time="2024-12-13T14:29:13.114258462Z" level=info msg="StartContainer for \"0a61f37d9457eb953cef82ee5d7295f902e8cc9f3e001cb0c6d6b3426a46fe0e\" returns successfully" Dec 13 14:29:13.117560 env[1212]: time="2024-12-13T14:29:13.117514209Z" level=info msg="StartContainer for \"cbbdd5a77a1bdc99ab5bc3eeefe013394c3075c6af5c71bced20893bd30f23c4\" returns successfully" Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.135 [WARNING][4850] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0", GenerateName:"calico-kube-controllers-5d54c8c5f7-", Namespace:"calico-system", SelfLink:"", UID:"994c246b-64eb-4675-9912-f2a04673e055", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 31, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d54c8c5f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"567db4ce38716740a1dd06c0f474caea9eb4e843d6374de67169a652d339ec70", Pod:"calico-kube-controllers-5d54c8c5f7-s76hx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali72c43ec3641", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.135 [INFO][4850] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.135 [INFO][4850] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" iface="eth0" netns="" Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.135 [INFO][4850] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.135 [INFO][4850] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.167 [INFO][4870] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" HandleID="k8s-pod-network.0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.167 [INFO][4870] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.167 [INFO][4870] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.172 [WARNING][4870] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" HandleID="k8s-pod-network.0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.172 [INFO][4870] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" HandleID="k8s-pod-network.0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Workload="localhost-k8s-calico--kube--controllers--5d54c8c5f7--s76hx-eth0" Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.174 [INFO][4870] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:13.177447 env[1212]: 2024-12-13 14:29:13.176 [INFO][4850] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021" Dec 13 14:29:13.177447 env[1212]: time="2024-12-13T14:29:13.177409495Z" level=info msg="TearDown network for sandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\" successfully" Dec 13 14:29:13.183769 env[1212]: time="2024-12-13T14:29:13.183709232Z" level=info msg="RemovePodSandbox \"0d84316a6524d46b25145ac928cfae1d473d288e72c36cb862a97806111bc021\" returns successfully" Dec 13 14:29:13.184496 env[1212]: time="2024-12-13T14:29:13.184452757Z" level=info msg="StopPodSandbox for \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\"" Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.233 [WARNING][4893] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0", GenerateName:"calico-apiserver-5b476db8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"947af00f-f596-478c-aa97-e03974cea6ab", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b476db8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba", Pod:"calico-apiserver-5b476db8c-2fnt7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3fa635c22dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.233 [INFO][4893] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.233 [INFO][4893] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" iface="eth0" netns="" Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.233 [INFO][4893] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.233 [INFO][4893] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.267 [INFO][4900] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" HandleID="k8s-pod-network.434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.267 [INFO][4900] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.267 [INFO][4900] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.272 [WARNING][4900] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" HandleID="k8s-pod-network.434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.272 [INFO][4900] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" HandleID="k8s-pod-network.434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.273 [INFO][4900] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:13.277682 env[1212]: 2024-12-13 14:29:13.275 [INFO][4893] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:13.278478 env[1212]: time="2024-12-13T14:29:13.278424345Z" level=info msg="TearDown network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\" successfully" Dec 13 14:29:13.278586 env[1212]: time="2024-12-13T14:29:13.278561989Z" level=info msg="StopPodSandbox for \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\" returns successfully" Dec 13 14:29:13.279256 env[1212]: time="2024-12-13T14:29:13.279234176Z" level=info msg="RemovePodSandbox for \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\"" Dec 13 14:29:13.279420 env[1212]: time="2024-12-13T14:29:13.279358384Z" level=info msg="Forcibly stopping sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\"" Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.327 [WARNING][4922] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0", GenerateName:"calico-apiserver-5b476db8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"947af00f-f596-478c-aa97-e03974cea6ab", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b476db8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1e7405b6792184e80636474764e8fffaac94cd9110a6ebe2c6ab47b21d4c7fba", Pod:"calico-apiserver-5b476db8c-2fnt7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3fa635c22dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.327 [INFO][4922] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.327 [INFO][4922] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" iface="eth0" netns="" Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.327 [INFO][4922] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.327 [INFO][4922] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.354 [INFO][4929] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" HandleID="k8s-pod-network.434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.355 [INFO][4929] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.355 [INFO][4929] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.363 [WARNING][4929] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" HandleID="k8s-pod-network.434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.363 [INFO][4929] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" HandleID="k8s-pod-network.434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Workload="localhost-k8s-calico--apiserver--5b476db8c--2fnt7-eth0" Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.364 [INFO][4929] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:13.368614 env[1212]: 2024-12-13 14:29:13.367 [INFO][4922] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510" Dec 13 14:29:13.369225 env[1212]: time="2024-12-13T14:29:13.369184752Z" level=info msg="TearDown network for sandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\" successfully" Dec 13 14:29:13.373229 env[1212]: time="2024-12-13T14:29:13.373172190Z" level=info msg="RemovePodSandbox \"434d6148f50e11bebe38f453b4c63b7d60d03248d4f7a2e2f176742ef2385510\" returns successfully" Dec 13 14:29:13.497316 kubelet[2056]: I1213 14:29:13.496956 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5b476db8c-kglgd" podStartSLOduration=42.49690792 podStartE2EDuration="42.49690792s" podCreationTimestamp="2024-12-13 14:28:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:29:13.496167952 +0000 UTC m=+62.286268841" watchObservedRunningTime="2024-12-13 14:29:13.49690792 +0000 UTC m=+62.287008939" Dec 13 14:29:13.511784 kubelet[2056]: I1213 14:29:13.511702 2056 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5b476db8c-2fnt7" podStartSLOduration=39.217390791 podStartE2EDuration="43.511649467s" podCreationTimestamp="2024-12-13 14:28:30 +0000 UTC" firstStartedPulling="2024-12-13 14:29:08.633653348 +0000 UTC m=+57.423754227" lastFinishedPulling="2024-12-13 14:29:12.927912024 +0000 UTC m=+61.718012903" observedRunningTime="2024-12-13 14:29:13.51095154 +0000 UTC m=+62.301052409" watchObservedRunningTime="2024-12-13 14:29:13.511649467 +0000 UTC m=+62.301750346" Dec 13 14:29:13.527000 audit[4938]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:13.527000 audit[4938]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffec2217220 a2=0 a3=7ffec221720c items=0 ppid=2261 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:13.534000 audit[4938]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:13.534000 audit[4938]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffec2217220 a2=0 a3=7ffec221720c items=0 ppid=2261 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.534000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:13.597000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.597000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00274c360 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:29:13.597000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:13.597000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.597000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e20d60 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:29:13.597000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:13.597000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.597000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0025d6700 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:29:13.597000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:13.597000 audit[1909]: AVC avc: denied { watch } for pid=1909 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.597000 audit[1909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c002e30040 a2=fc6 a3=0 items=0 ppid=1772 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c339,c929 key=(null) Dec 13 14:29:13.597000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:13.779214 systemd-networkd[1029]: cali34b67de6aca: Gained IPv6LL Dec 13 14:29:13.785000 audit[4810]: AVC avc: denied { watch } for pid=4810 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_28_45.1411581587/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c457,c527 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c457,c527 tclass=file permissive=0 Dec 13 14:29:13.785000 audit[4810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ba9b80 a2=fc6 a3=0 items=0 ppid=4336 pid=4810 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c457,c527 key=(null) Dec 13 14:29:13.785000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:29:13.808000 audit[4800]: AVC avc: denied { watch } for pid=4800 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_28_45.1765255122/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c354,c787 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c354,c787 tclass=file permissive=0 Dec 13 14:29:13.808000 audit[4800]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a25e20 a2=fc6 a3=0 items=0 ppid=4695 pid=4800 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c354,c787 key=(null) Dec 13 14:29:13.808000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:29:13.820000 audit[4940]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:13.820000 audit[4940]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc30a1b590 a2=0 a3=7ffc30a1b57c items=0 ppid=2261 pid=4940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.820000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:13.825000 audit[4940]: NETFILTER_CFG table=nat:114 family=2 entries=27 op=nft_register_chain pid=4940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:13.825000 audit[4940]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc30a1b590 a2=0 a3=7ffc30a1b57c items=0 ppid=2261 pid=4940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:14.492114 kubelet[2056]: I1213 14:29:14.492067 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:29:15.980942 systemd[1]: run-containerd-runc-k8s.io-8d1ffaf26d6689633368656dc12b6853368693114d136365e31c625b9450568a-runc.bC7kGO.mount: Deactivated successfully. Dec 13 14:29:16.861327 systemd[1]: Started sshd@15-10.0.0.115:22-10.0.0.1:44238.service. Dec 13 14:29:16.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.115:22-10.0.0.1:44238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:16.863273 kernel: kauditd_printk_skb: 205 callbacks suppressed Dec 13 14:29:16.863339 kernel: audit: type=1130 audit(1734100156.860:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.115:22-10.0.0.1:44238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:16.912000 audit[4962]: USER_ACCT pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:16.916314 sshd[4962]: Accepted publickey for core from 10.0.0.1 port 44238 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:16.914000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:16.919634 sshd[4962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:16.924922 kernel: audit: type=1101 audit(1734100156.912:1393): pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:16.925091 kernel: audit: type=1103 audit(1734100156.914:1394): pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:16.925243 systemd-logind[1203]: New session 16 of user core. Dec 13 14:29:16.926227 systemd[1]: Started session-16.scope. Dec 13 14:29:16.932929 kernel: audit: type=1006 audit(1734100156.914:1395): pid=4962 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:29:16.933069 kernel: audit: type=1300 audit(1734100156.914:1395): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc99db0710 a2=3 a3=0 items=0 ppid=1 pid=4962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:16.914000 audit[4962]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc99db0710 a2=3 a3=0 items=0 ppid=1 pid=4962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:16.914000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:16.930000 audit[4962]: USER_START pid=4962 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:16.940307 kernel: audit: type=1327 audit(1734100156.914:1395): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:16.940398 kernel: audit: type=1105 audit(1734100156.930:1396): pid=4962 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:16.931000 audit[4964]: CRED_ACQ pid=4964 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:16.944385 kernel: audit: type=1103 audit(1734100156.931:1397): pid=4964 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:17.068528 sshd[4962]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:17.068000 audit[4962]: USER_END pid=4962 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:17.071261 systemd[1]: sshd@15-10.0.0.115:22-10.0.0.1:44238.service: Deactivated successfully. Dec 13 14:29:17.072173 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:29:17.072838 systemd-logind[1203]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:29:17.073668 systemd-logind[1203]: Removed session 16. Dec 13 14:29:17.068000 audit[4962]: CRED_DISP pid=4962 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:17.077326 kernel: audit: type=1106 audit(1734100157.068:1398): pid=4962 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:17.077389 kernel: audit: type=1104 audit(1734100157.068:1399): pid=4962 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:17.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.115:22-10.0.0.1:44238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:21.281157 kubelet[2056]: E1213 14:29:21.281096 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:22.073764 systemd[1]: Started sshd@16-10.0.0.115:22-10.0.0.1:41394.service. Dec 13 14:29:22.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.115:22-10.0.0.1:41394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.075115 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:29:22.075185 kernel: audit: type=1130 audit(1734100162.072:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.115:22-10.0.0.1:41394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.117000 audit[4984]: USER_ACCT pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.130336 kernel: audit: type=1101 audit(1734100162.117:1402): pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.130603 kernel: audit: type=1103 audit(1734100162.121:1403): pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.130625 kernel: audit: type=1006 audit(1734100162.121:1404): pid=4984 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:29:22.121000 audit[4984]: CRED_ACQ pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.130703 sshd[4984]: Accepted publickey for core from 10.0.0.1 port 41394 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:22.123480 sshd[4984]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:22.121000 audit[4984]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffceec4ab0 a2=3 a3=0 items=0 ppid=1 pid=4984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:22.133272 systemd[1]: Started session-17.scope. Dec 13 14:29:22.134898 systemd-logind[1203]: New session 17 of user core. Dec 13 14:29:22.121000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:22.136884 kernel: audit: type=1300 audit(1734100162.121:1404): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffceec4ab0 a2=3 a3=0 items=0 ppid=1 pid=4984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:22.136938 kernel: audit: type=1327 audit(1734100162.121:1404): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:22.139000 audit[4984]: USER_START pid=4984 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.140000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.148526 kernel: audit: type=1105 audit(1734100162.139:1405): pid=4984 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.148574 kernel: audit: type=1103 audit(1734100162.140:1406): pid=4986 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.251538 sshd[4984]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:22.251000 audit[4984]: USER_END pid=4984 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.258127 kernel: audit: type=1106 audit(1734100162.251:1407): pid=4984 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.255298 systemd[1]: Started sshd@17-10.0.0.115:22-10.0.0.1:41400.service. Dec 13 14:29:22.255733 systemd[1]: sshd@16-10.0.0.115:22-10.0.0.1:41394.service: Deactivated successfully. Dec 13 14:29:22.251000 audit[4984]: CRED_DISP pid=4984 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.115:22-10.0.0.1:41400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.115:22-10.0.0.1:41394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.262105 kernel: audit: type=1104 audit(1734100162.251:1408): pid=4984 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.256368 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:29:22.256999 systemd-logind[1203]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:29:22.257811 systemd-logind[1203]: Removed session 17. Dec 13 14:29:22.296000 audit[4996]: USER_ACCT pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.298145 sshd[4996]: Accepted publickey for core from 10.0.0.1 port 41400 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:22.299327 sshd[4996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:22.297000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.297000 audit[4996]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfbb3f220 a2=3 a3=0 items=0 ppid=1 pid=4996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:22.297000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:22.303507 systemd-logind[1203]: New session 18 of user core. Dec 13 14:29:22.304593 systemd[1]: Started session-18.scope. Dec 13 14:29:22.308000 audit[4996]: USER_START pid=4996 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.309000 audit[4999]: CRED_ACQ pid=4999 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.601139 sshd[4996]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:22.601000 audit[4996]: USER_END pid=4996 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.601000 audit[4996]: CRED_DISP pid=4996 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.115:22-10.0.0.1:41412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.604461 systemd[1]: Started sshd@18-10.0.0.115:22-10.0.0.1:41412.service. Dec 13 14:29:22.606522 systemd[1]: sshd@17-10.0.0.115:22-10.0.0.1:41400.service: Deactivated successfully. Dec 13 14:29:22.607091 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:29:22.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.115:22-10.0.0.1:41400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.607560 systemd-logind[1203]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:29:22.608217 systemd-logind[1203]: Removed session 18. Dec 13 14:29:22.646000 audit[5008]: USER_ACCT pid=5008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.647313 sshd[5008]: Accepted publickey for core from 10.0.0.1 port 41412 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:22.647000 audit[5008]: CRED_ACQ pid=5008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.647000 audit[5008]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff43a1c600 a2=3 a3=0 items=0 ppid=1 pid=5008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:22.647000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:22.648671 sshd[5008]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:22.652324 systemd-logind[1203]: New session 19 of user core. Dec 13 14:29:22.653245 systemd[1]: Started session-19.scope. Dec 13 14:29:22.656000 audit[5008]: USER_START pid=5008 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:22.657000 audit[5011]: CRED_ACQ pid=5011 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:23.344381 kubelet[2056]: I1213 14:29:23.344343 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:29:23.423000 audit[5025]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=5025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:23.423000 audit[5025]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc3c776fc0 a2=0 a3=7ffc3c776fac items=0 ppid=2261 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:23.428000 audit[5025]: NETFILTER_CFG table=nat:116 family=2 entries=34 op=nft_register_chain pid=5025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:23.428000 audit[5025]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc3c776fc0 a2=0 a3=7ffc3c776fac items=0 ppid=2261 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:24.510000 audit[5027]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=5027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:24.510000 audit[5027]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffca26e710 a2=0 a3=7fffca26e6fc items=0 ppid=2261 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:24.516000 audit[5027]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=5027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:24.516000 audit[5027]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffca26e710 a2=0 a3=0 items=0 ppid=2261 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.516000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:24.525455 sshd[5008]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:24.525000 audit[5008]: USER_END pid=5008 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.525000 audit[5008]: CRED_DISP pid=5008 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.528222 systemd[1]: sshd@18-10.0.0.115:22-10.0.0.1:41412.service: Deactivated successfully. Dec 13 14:29:24.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.115:22-10.0.0.1:41412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:24.528732 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:29:24.529418 systemd-logind[1203]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:29:24.530289 systemd[1]: Started sshd@19-10.0.0.115:22-10.0.0.1:41426.service. Dec 13 14:29:24.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.115:22-10.0.0.1:41426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:24.530000 audit[5031]: NETFILTER_CFG table=filter:119 family=2 entries=32 op=nft_register_rule pid=5031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:24.530000 audit[5031]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdccb10e50 a2=0 a3=7ffdccb10e3c items=0 ppid=2261 pid=5031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:24.532421 systemd-logind[1203]: Removed session 19. Dec 13 14:29:24.537000 audit[5031]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:24.537000 audit[5031]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdccb10e50 a2=0 a3=0 items=0 ppid=2261 pid=5031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:24.570000 audit[5032]: USER_ACCT pid=5032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.572158 sshd[5032]: Accepted publickey for core from 10.0.0.1 port 41426 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:24.571000 audit[5032]: CRED_ACQ pid=5032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.571000 audit[5032]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe274340d0 a2=3 a3=0 items=0 ppid=1 pid=5032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.571000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:24.573342 sshd[5032]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:24.577095 systemd-logind[1203]: New session 20 of user core. Dec 13 14:29:24.577912 systemd[1]: Started session-20.scope. Dec 13 14:29:24.581000 audit[5032]: USER_START pid=5032 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.582000 audit[5034]: CRED_ACQ pid=5034 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.840424 sshd[5032]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:24.841000 audit[5032]: USER_END pid=5032 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.841000 audit[5032]: CRED_DISP pid=5032 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.844284 systemd[1]: sshd@19-10.0.0.115:22-10.0.0.1:41426.service: Deactivated successfully. Dec 13 14:29:24.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.115:22-10.0.0.1:41426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:24.845009 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:29:24.845689 systemd-logind[1203]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:29:24.847354 systemd[1]: Started sshd@20-10.0.0.115:22-10.0.0.1:41440.service. Dec 13 14:29:24.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.115:22-10.0.0.1:41440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:24.853001 systemd-logind[1203]: Removed session 20. Dec 13 14:29:24.889000 audit[5043]: USER_ACCT pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.891162 sshd[5043]: Accepted publickey for core from 10.0.0.1 port 41440 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:24.890000 audit[5043]: CRED_ACQ pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.890000 audit[5043]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbaa56550 a2=3 a3=0 items=0 ppid=1 pid=5043 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.890000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:24.892284 sshd[5043]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:24.895455 systemd-logind[1203]: New session 21 of user core. Dec 13 14:29:24.896276 systemd[1]: Started session-21.scope. Dec 13 14:29:24.899000 audit[5043]: USER_START pid=5043 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:24.900000 audit[5045]: CRED_ACQ pid=5045 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.009157 sshd[5043]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:25.009000 audit[5043]: USER_END pid=5043 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.009000 audit[5043]: CRED_DISP pid=5043 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.012408 systemd[1]: sshd@20-10.0.0.115:22-10.0.0.1:41440.service: Deactivated successfully. Dec 13 14:29:25.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.115:22-10.0.0.1:41440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.013260 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:29:25.014143 systemd-logind[1203]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:29:25.015049 systemd-logind[1203]: Removed session 21. Dec 13 14:29:30.014358 systemd[1]: Started sshd@21-10.0.0.115:22-10.0.0.1:52902.service. Dec 13 14:29:30.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.115:22-10.0.0.1:52902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:30.016148 kernel: kauditd_printk_skb: 63 callbacks suppressed Dec 13 14:29:30.016295 kernel: audit: type=1130 audit(1734100170.014:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.115:22-10.0.0.1:52902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:30.055000 audit[5058]: USER_ACCT pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.056210 sshd[5058]: Accepted publickey for core from 10.0.0.1 port 52902 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:30.061000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.061715 sshd[5058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:30.065510 kernel: audit: type=1101 audit(1734100170.055:1453): pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.065594 kernel: audit: type=1103 audit(1734100170.061:1454): pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.065639 kernel: audit: type=1006 audit(1734100170.061:1455): pid=5058 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:29:30.065632 systemd-logind[1203]: New session 22 of user core. Dec 13 14:29:30.066548 systemd[1]: Started session-22.scope. Dec 13 14:29:30.061000 audit[5058]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3da9f420 a2=3 a3=0 items=0 ppid=1 pid=5058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.072524 kernel: audit: type=1300 audit(1734100170.061:1455): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3da9f420 a2=3 a3=0 items=0 ppid=1 pid=5058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.072604 kernel: audit: type=1327 audit(1734100170.061:1455): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:30.061000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:30.071000 audit[5058]: USER_START pid=5058 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.078780 kernel: audit: type=1105 audit(1734100170.071:1456): pid=5058 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.078828 kernel: audit: type=1103 audit(1734100170.072:1457): pid=5060 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.072000 audit[5060]: CRED_ACQ pid=5060 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.173529 sshd[5058]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:30.174000 audit[5058]: USER_END pid=5058 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.177114 systemd[1]: sshd@21-10.0.0.115:22-10.0.0.1:52902.service: Deactivated successfully. Dec 13 14:29:30.178020 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:29:30.174000 audit[5058]: CRED_DISP pid=5058 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.180957 systemd-logind[1203]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:29:30.182258 systemd-logind[1203]: Removed session 22. Dec 13 14:29:30.183679 kernel: audit: type=1106 audit(1734100170.174:1458): pid=5058 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.183779 kernel: audit: type=1104 audit(1734100170.174:1459): pid=5058 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.115:22-10.0.0.1:52902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.292000 audit[5071]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:31.292000 audit[5071]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff0a79a0b0 a2=0 a3=7fff0a79a09c items=0 ppid=2261 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.292000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:31.302000 audit[5071]: NETFILTER_CFG table=nat:122 family=2 entries=106 op=nft_register_chain pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:31.302000 audit[5071]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff0a79a0b0 a2=0 a3=7fff0a79a09c items=0 ppid=2261 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:35.178301 systemd[1]: Started sshd@22-10.0.0.115:22-10.0.0.1:52924.service. Dec 13 14:29:35.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.115:22-10.0.0.1:52924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:35.179525 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:29:35.179630 kernel: audit: type=1130 audit(1734100175.177:1463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.115:22-10.0.0.1:52924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:35.220000 audit[5079]: USER_ACCT pid=5079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.221849 sshd[5079]: Accepted publickey for core from 10.0.0.1 port 52924 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:35.223929 sshd[5079]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:35.222000 audit[5079]: CRED_ACQ pid=5079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.228500 systemd-logind[1203]: New session 23 of user core. Dec 13 14:29:35.229397 systemd[1]: Started session-23.scope. Dec 13 14:29:35.231310 kernel: audit: type=1101 audit(1734100175.220:1464): pid=5079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.231369 kernel: audit: type=1103 audit(1734100175.222:1465): pid=5079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.231595 kernel: audit: type=1006 audit(1734100175.222:1466): pid=5079 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:29:35.222000 audit[5079]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc198a1c60 a2=3 a3=0 items=0 ppid=1 pid=5079 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:35.239097 kernel: audit: type=1300 audit(1734100175.222:1466): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc198a1c60 a2=3 a3=0 items=0 ppid=1 pid=5079 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:35.239192 kernel: audit: type=1327 audit(1734100175.222:1466): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:35.222000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:35.234000 audit[5079]: USER_START pid=5079 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.245563 kernel: audit: type=1105 audit(1734100175.234:1467): pid=5079 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.235000 audit[5081]: CRED_ACQ pid=5081 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.249649 kernel: audit: type=1103 audit(1734100175.235:1468): pid=5081 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.346017 sshd[5079]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:35.347000 audit[5079]: USER_END pid=5079 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.349836 systemd[1]: sshd@22-10.0.0.115:22-10.0.0.1:52924.service: Deactivated successfully. Dec 13 14:29:35.350884 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:29:35.351595 systemd-logind[1203]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:29:35.352364 systemd-logind[1203]: Removed session 23. Dec 13 14:29:35.347000 audit[5079]: CRED_DISP pid=5079 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.357495 kernel: audit: type=1106 audit(1734100175.347:1469): pid=5079 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.357555 kernel: audit: type=1104 audit(1734100175.347:1470): pid=5079 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.115:22-10.0.0.1:52924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:40.351124 systemd[1]: Started sshd@23-10.0.0.115:22-10.0.0.1:51766.service. Dec 13 14:29:40.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.115:22-10.0.0.1:51766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:40.356245 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:29:40.356304 kernel: audit: type=1130 audit(1734100180.350:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.115:22-10.0.0.1:51766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:40.393000 audit[5114]: USER_ACCT pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.394435 sshd[5114]: Accepted publickey for core from 10.0.0.1 port 51766 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:40.400083 kernel: audit: type=1101 audit(1734100180.393:1473): pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.400196 kernel: audit: type=1103 audit(1734100180.399:1474): pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.399000 audit[5114]: CRED_ACQ pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.400528 sshd[5114]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:40.404349 systemd-logind[1203]: New session 24 of user core. Dec 13 14:29:40.405126 systemd[1]: Started session-24.scope. Dec 13 14:29:40.408730 kernel: audit: type=1006 audit(1734100180.399:1475): pid=5114 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:29:40.399000 audit[5114]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeec4c2040 a2=3 a3=0 items=0 ppid=1 pid=5114 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:40.414475 kernel: audit: type=1300 audit(1734100180.399:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeec4c2040 a2=3 a3=0 items=0 ppid=1 pid=5114 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:40.414677 kernel: audit: type=1327 audit(1734100180.399:1475): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:40.399000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:40.416421 kernel: audit: type=1105 audit(1734100180.408:1476): pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.408000 audit[5114]: USER_START pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.410000 audit[5116]: CRED_ACQ pid=5116 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.427247 kernel: audit: type=1103 audit(1734100180.410:1477): pid=5116 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.516308 sshd[5114]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:40.516000 audit[5114]: USER_END pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.518603 systemd[1]: sshd@23-10.0.0.115:22-10.0.0.1:51766.service: Deactivated successfully. Dec 13 14:29:40.519554 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:29:40.520199 systemd-logind[1203]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:29:40.520970 systemd-logind[1203]: Removed session 24. Dec 13 14:29:40.516000 audit[5114]: CRED_DISP pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.526081 kernel: audit: type=1106 audit(1734100180.516:1478): pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.526138 kernel: audit: type=1104 audit(1734100180.516:1479): pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:40.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.115:22-10.0.0.1:51766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:42.280411 kubelet[2056]: E1213 14:29:42.280360 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:45.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.115:22-10.0.0.1:51788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.521922 systemd[1]: Started sshd@24-10.0.0.115:22-10.0.0.1:51788.service. Dec 13 14:29:45.526991 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:29:45.527083 kernel: audit: type=1130 audit(1734100185.520:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.115:22-10.0.0.1:51788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.562000 audit[5134]: USER_ACCT pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.564175 sshd[5134]: Accepted publickey for core from 10.0.0.1 port 51788 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:45.567000 audit[5134]: CRED_ACQ pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.568707 sshd[5134]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:45.572373 kernel: audit: type=1101 audit(1734100185.562:1482): pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.572500 kernel: audit: type=1103 audit(1734100185.567:1483): pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.572529 kernel: audit: type=1006 audit(1734100185.567:1484): pid=5134 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:29:45.572647 systemd-logind[1203]: New session 25 of user core. Dec 13 14:29:45.573188 systemd[1]: Started session-25.scope. Dec 13 14:29:45.567000 audit[5134]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff466c4db0 a2=3 a3=0 items=0 ppid=1 pid=5134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:45.579416 kernel: audit: type=1300 audit(1734100185.567:1484): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff466c4db0 a2=3 a3=0 items=0 ppid=1 pid=5134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:45.579509 kernel: audit: type=1327 audit(1734100185.567:1484): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:45.567000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:45.577000 audit[5134]: USER_START pid=5134 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.585510 kernel: audit: type=1105 audit(1734100185.577:1485): pid=5134 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.585558 kernel: audit: type=1103 audit(1734100185.578:1486): pid=5136 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.578000 audit[5136]: CRED_ACQ pid=5136 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.679858 sshd[5134]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:45.679000 audit[5134]: USER_END pid=5134 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.682298 systemd[1]: sshd@24-10.0.0.115:22-10.0.0.1:51788.service: Deactivated successfully. Dec 13 14:29:45.683102 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:29:45.683854 systemd-logind[1203]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:29:45.684681 systemd-logind[1203]: Removed session 25. Dec 13 14:29:45.680000 audit[5134]: CRED_DISP pid=5134 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.689220 kernel: audit: type=1106 audit(1734100185.679:1487): pid=5134 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.689271 kernel: audit: type=1104 audit(1734100185.680:1488): pid=5134 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:45.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.115:22-10.0.0.1:51788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'