Dec 13 14:22:29.023269 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:22:29.023298 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:22:29.023324 kernel: BIOS-provided physical RAM map: Dec 13 14:22:29.023331 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:22:29.023336 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:22:29.023341 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:22:29.023348 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:22:29.023355 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:22:29.023362 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:22:29.023371 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:22:29.023378 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 14:22:29.023385 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:22:29.023392 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:22:29.023400 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:22:29.023409 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:22:29.023418 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:22:29.023426 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:22:29.023433 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:22:29.023441 kernel: NX (Execute Disable) protection: active Dec 13 14:22:29.023449 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:22:29.023457 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:22:29.023464 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:22:29.023472 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:22:29.023479 kernel: extended physical RAM map: Dec 13 14:22:29.023486 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:22:29.023496 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:22:29.023503 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:22:29.023511 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:22:29.023519 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:22:29.023526 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:22:29.023534 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:22:29.023541 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 14:22:29.023549 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 14:22:29.023556 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 14:22:29.023564 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 14:22:29.023571 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 14:22:29.023580 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:22:29.023587 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:22:29.023594 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:22:29.023602 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:22:29.023613 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:22:29.023621 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:22:29.023630 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:22:29.023639 kernel: efi: EFI v2.70 by EDK II Dec 13 14:22:29.023647 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 14:22:29.023655 kernel: random: crng init done Dec 13 14:22:29.023664 kernel: SMBIOS 2.8 present. Dec 13 14:22:29.023672 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 14:22:29.023680 kernel: Hypervisor detected: KVM Dec 13 14:22:29.023688 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:22:29.023696 kernel: kvm-clock: cpu 0, msr 6819a001, primary cpu clock Dec 13 14:22:29.023704 kernel: kvm-clock: using sched offset of 4251315578 cycles Dec 13 14:22:29.023718 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:22:29.023726 kernel: tsc: Detected 2794.748 MHz processor Dec 13 14:22:29.023735 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:22:29.023744 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:22:29.023752 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 14:22:29.023761 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:22:29.023769 kernel: Using GB pages for direct mapping Dec 13 14:22:29.023777 kernel: Secure boot disabled Dec 13 14:22:29.023786 kernel: ACPI: Early table checksum verification disabled Dec 13 14:22:29.023796 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 14:22:29.023804 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 14:22:29.023813 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:29.023821 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:29.023830 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 14:22:29.023838 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:29.023846 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:29.023854 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:29.023863 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:22:29.023873 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 14:22:29.023881 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 14:22:29.023890 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 14:22:29.023898 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 14:22:29.023906 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 14:22:29.023914 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 14:22:29.023923 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 14:22:29.023931 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 14:22:29.023940 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 14:22:29.023950 kernel: No NUMA configuration found Dec 13 14:22:29.023958 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 14:22:29.023966 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 14:22:29.023975 kernel: Zone ranges: Dec 13 14:22:29.023983 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:22:29.023991 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 14:22:29.023999 kernel: Normal empty Dec 13 14:22:29.024008 kernel: Movable zone start for each node Dec 13 14:22:29.024016 kernel: Early memory node ranges Dec 13 14:22:29.024026 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:22:29.024034 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 14:22:29.024042 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 14:22:29.024051 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 14:22:29.024059 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 14:22:29.024067 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 14:22:29.024076 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 14:22:29.024084 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:22:29.024092 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:22:29.024100 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 14:22:29.024110 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:22:29.024119 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 14:22:29.024136 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 14:22:29.024144 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 14:22:29.024153 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:22:29.024163 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:22:29.024172 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:22:29.024180 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:22:29.024188 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:22:29.024198 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:22:29.024207 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:22:29.024215 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:22:29.024226 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:22:29.024235 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:22:29.024243 kernel: TSC deadline timer available Dec 13 14:22:29.024251 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 14:22:29.024259 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 14:22:29.024268 kernel: kvm-guest: setup PV sched yield Dec 13 14:22:29.024277 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:22:29.024286 kernel: Booting paravirtualized kernel on KVM Dec 13 14:22:29.024300 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:22:29.024321 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 14:22:29.024330 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 14:22:29.024338 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 14:22:29.024347 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 14:22:29.024356 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 14:22:29.024365 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 14:22:29.024373 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:22:29.024382 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:22:29.024390 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 14:22:29.024401 kernel: Policy zone: DMA32 Dec 13 14:22:29.024411 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:22:29.024420 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:22:29.024428 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:22:29.024439 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:22:29.024448 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:22:29.024457 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 169308K reserved, 0K cma-reserved) Dec 13 14:22:29.024466 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 14:22:29.024474 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:22:29.024483 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:22:29.024492 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:22:29.024501 kernel: rcu: RCU event tracing is enabled. Dec 13 14:22:29.024510 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 14:22:29.024520 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:22:29.024529 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:22:29.024538 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:22:29.024547 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 14:22:29.024555 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 14:22:29.024564 kernel: Console: colour dummy device 80x25 Dec 13 14:22:29.024573 kernel: printk: console [ttyS0] enabled Dec 13 14:22:29.024582 kernel: ACPI: Core revision 20210730 Dec 13 14:22:29.024591 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 14:22:29.024601 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:22:29.024609 kernel: x2apic enabled Dec 13 14:22:29.024618 kernel: Switched APIC routing to physical x2apic. Dec 13 14:22:29.024627 kernel: kvm-guest: setup PV IPIs Dec 13 14:22:29.024635 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:22:29.024644 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:22:29.024653 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 14:22:29.024661 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 14:22:29.024668 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 14:22:29.024677 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 14:22:29.024683 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:22:29.024690 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:22:29.024697 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:22:29.024704 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:22:29.024711 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 14:22:29.024718 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 14:22:29.024728 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:22:29.024735 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:22:29.024743 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:22:29.024750 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:22:29.024757 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:22:29.024764 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:22:29.024770 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:22:29.024777 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:22:29.024784 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:22:29.024791 kernel: LSM: Security Framework initializing Dec 13 14:22:29.024798 kernel: SELinux: Initializing. Dec 13 14:22:29.024806 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:22:29.024813 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:22:29.024820 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 14:22:29.024826 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 14:22:29.024833 kernel: ... version: 0 Dec 13 14:22:29.024840 kernel: ... bit width: 48 Dec 13 14:22:29.024847 kernel: ... generic registers: 6 Dec 13 14:22:29.024854 kernel: ... value mask: 0000ffffffffffff Dec 13 14:22:29.024860 kernel: ... max period: 00007fffffffffff Dec 13 14:22:29.024869 kernel: ... fixed-purpose events: 0 Dec 13 14:22:29.024875 kernel: ... event mask: 000000000000003f Dec 13 14:22:29.024882 kernel: signal: max sigframe size: 1776 Dec 13 14:22:29.024889 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:22:29.024896 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:22:29.024902 kernel: x86: Booting SMP configuration: Dec 13 14:22:29.024909 kernel: .... node #0, CPUs: #1 Dec 13 14:22:29.024916 kernel: kvm-clock: cpu 1, msr 6819a041, secondary cpu clock Dec 13 14:22:29.024923 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 14:22:29.024931 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 14:22:29.024937 kernel: #2 Dec 13 14:22:29.024944 kernel: kvm-clock: cpu 2, msr 6819a081, secondary cpu clock Dec 13 14:22:29.024951 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 14:22:29.024958 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 14:22:29.024964 kernel: #3 Dec 13 14:22:29.024971 kernel: kvm-clock: cpu 3, msr 6819a0c1, secondary cpu clock Dec 13 14:22:29.024978 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 14:22:29.024984 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 14:22:29.024991 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 14:22:29.024999 kernel: smpboot: Max logical packages: 1 Dec 13 14:22:29.025006 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 14:22:29.025012 kernel: devtmpfs: initialized Dec 13 14:22:29.025019 kernel: x86/mm: Memory block size: 128MB Dec 13 14:22:29.025026 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 14:22:29.025033 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 14:22:29.025040 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 14:22:29.025047 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 14:22:29.025054 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 14:22:29.025062 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:22:29.025069 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 14:22:29.025076 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:22:29.025083 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:22:29.025090 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:22:29.025096 kernel: audit: type=2000 audit(1734099749.207:1): state=initialized audit_enabled=0 res=1 Dec 13 14:22:29.025103 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:22:29.025110 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:22:29.025118 kernel: cpuidle: using governor menu Dec 13 14:22:29.025124 kernel: ACPI: bus type PCI registered Dec 13 14:22:29.025141 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:22:29.025148 kernel: dca service started, version 1.12.1 Dec 13 14:22:29.025155 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 14:22:29.025162 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 14:22:29.025168 kernel: PCI: Using configuration type 1 for base access Dec 13 14:22:29.025178 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:22:29.025185 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:22:29.025193 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:22:29.025200 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:22:29.025206 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:22:29.025213 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:22:29.025220 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:22:29.025227 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:22:29.025234 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:22:29.025241 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:22:29.025247 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:22:29.025254 kernel: ACPI: Interpreter enabled Dec 13 14:22:29.025262 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:22:29.025269 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:22:29.025276 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:22:29.025283 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 14:22:29.025290 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:22:29.025439 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:22:29.025535 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 14:22:29.025624 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 14:22:29.025634 kernel: PCI host bridge to bus 0000:00 Dec 13 14:22:29.025723 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:22:29.025787 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:22:29.025847 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:22:29.025910 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 14:22:29.025986 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:22:29.026051 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 14:22:29.026115 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:22:29.026221 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 14:22:29.026322 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 14:22:29.026394 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 14:22:29.026472 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 14:22:29.026577 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 14:22:29.026702 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 14:22:29.026828 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:22:29.026920 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:22:29.026993 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 14:22:29.027061 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 14:22:29.027139 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 14:22:29.027226 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:22:29.027323 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 14:22:29.027398 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 14:22:29.027478 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 14:22:29.027581 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:22:29.027654 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 14:22:29.027724 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 14:22:29.027797 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 14:22:29.027870 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 14:22:29.027961 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 14:22:29.028033 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 14:22:29.028139 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 14:22:29.028212 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 14:22:29.028281 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 14:22:29.028380 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 14:22:29.028455 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 14:22:29.028468 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:22:29.028477 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:22:29.028484 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:22:29.028491 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:22:29.028498 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 14:22:29.028505 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 14:22:29.028519 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 14:22:29.028526 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 14:22:29.028533 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 14:22:29.028545 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 14:22:29.028552 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 14:22:29.028559 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 14:22:29.028566 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 14:22:29.028572 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 14:22:29.028579 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 14:22:29.028587 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 14:22:29.028594 kernel: iommu: Default domain type: Translated Dec 13 14:22:29.028601 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:22:29.028677 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 14:22:29.028748 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:22:29.028817 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 14:22:29.028826 kernel: vgaarb: loaded Dec 13 14:22:29.028834 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:22:29.028841 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:22:29.028850 kernel: PTP clock support registered Dec 13 14:22:29.028857 kernel: Registered efivars operations Dec 13 14:22:29.028864 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:22:29.028871 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:22:29.028878 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 14:22:29.028885 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 14:22:29.028892 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 14:22:29.028898 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 14:22:29.028905 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 14:22:29.028914 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 14:22:29.028920 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 14:22:29.028927 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 14:22:29.028934 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:22:29.028941 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:22:29.028948 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:22:29.028955 kernel: pnp: PnP ACPI init Dec 13 14:22:29.029063 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 14:22:29.029080 kernel: pnp: PnP ACPI: found 6 devices Dec 13 14:22:29.029089 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:22:29.029097 kernel: NET: Registered PF_INET protocol family Dec 13 14:22:29.029104 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:22:29.029111 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:22:29.029118 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:22:29.029125 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:22:29.029142 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:22:29.029151 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:22:29.029158 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:22:29.029165 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:22:29.029172 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:22:29.029179 kernel: NET: Registered PF_XDP protocol family Dec 13 14:22:29.029282 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 14:22:29.029367 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 14:22:29.029432 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:22:29.029513 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:22:29.029600 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:22:29.029669 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 14:22:29.029729 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 14:22:29.029789 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 14:22:29.029798 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:22:29.029805 kernel: Initialise system trusted keyrings Dec 13 14:22:29.029812 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:22:29.029819 kernel: Key type asymmetric registered Dec 13 14:22:29.029829 kernel: Asymmetric key parser 'x509' registered Dec 13 14:22:29.029837 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:22:29.029853 kernel: io scheduler mq-deadline registered Dec 13 14:22:29.029861 kernel: io scheduler kyber registered Dec 13 14:22:29.029868 kernel: io scheduler bfq registered Dec 13 14:22:29.029876 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:22:29.029883 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 14:22:29.029890 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 14:22:29.029898 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 14:22:29.029906 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:22:29.029914 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:22:29.029921 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:22:29.029928 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:22:29.029936 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:22:29.030019 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:22:29.030030 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:22:29.030094 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:22:29.030176 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:22:28 UTC (1734099748) Dec 13 14:22:29.030240 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 14:22:29.030249 kernel: efifb: probing for efifb Dec 13 14:22:29.030257 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 14:22:29.030264 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 14:22:29.030271 kernel: efifb: scrolling: redraw Dec 13 14:22:29.030279 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:22:29.030286 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 14:22:29.030293 kernel: fb0: EFI VGA frame buffer device Dec 13 14:22:29.030303 kernel: pstore: Registered efi as persistent store backend Dec 13 14:22:29.030333 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:22:29.030340 kernel: Segment Routing with IPv6 Dec 13 14:22:29.030350 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:22:29.030357 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:22:29.030364 kernel: Key type dns_resolver registered Dec 13 14:22:29.030373 kernel: IPI shorthand broadcast: enabled Dec 13 14:22:29.030380 kernel: sched_clock: Marking stable (460264183, 128504924)->(684487959, -95718852) Dec 13 14:22:29.030388 kernel: registered taskstats version 1 Dec 13 14:22:29.030395 kernel: Loading compiled-in X.509 certificates Dec 13 14:22:29.030403 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:22:29.030410 kernel: Key type .fscrypt registered Dec 13 14:22:29.030417 kernel: Key type fscrypt-provisioning registered Dec 13 14:22:29.030424 kernel: pstore: Using crash dump compression: deflate Dec 13 14:22:29.030433 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:22:29.030441 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:22:29.030451 kernel: ima: No architecture policies found Dec 13 14:22:29.030460 kernel: clk: Disabling unused clocks Dec 13 14:22:29.030472 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:22:29.030479 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:22:29.030487 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:22:29.030494 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:22:29.030502 kernel: Run /init as init process Dec 13 14:22:29.030510 kernel: with arguments: Dec 13 14:22:29.030517 kernel: /init Dec 13 14:22:29.030524 kernel: with environment: Dec 13 14:22:29.030531 kernel: HOME=/ Dec 13 14:22:29.030539 kernel: TERM=linux Dec 13 14:22:29.030546 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:22:29.030555 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:22:29.030565 systemd[1]: Detected virtualization kvm. Dec 13 14:22:29.030574 systemd[1]: Detected architecture x86-64. Dec 13 14:22:29.030582 systemd[1]: Running in initrd. Dec 13 14:22:29.030589 systemd[1]: No hostname configured, using default hostname. Dec 13 14:22:29.030597 systemd[1]: Hostname set to . Dec 13 14:22:29.030605 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:22:29.030613 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:22:29.030620 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:22:29.030628 systemd[1]: Reached target cryptsetup.target. Dec 13 14:22:29.030635 systemd[1]: Reached target paths.target. Dec 13 14:22:29.030644 systemd[1]: Reached target slices.target. Dec 13 14:22:29.030652 systemd[1]: Reached target swap.target. Dec 13 14:22:29.030660 systemd[1]: Reached target timers.target. Dec 13 14:22:29.030676 systemd[1]: Listening on iscsid.socket. Dec 13 14:22:29.030688 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:22:29.030698 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:22:29.030708 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:22:29.030721 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:22:29.030728 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:22:29.030736 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:22:29.030744 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:22:29.030751 systemd[1]: Reached target sockets.target. Dec 13 14:22:29.030759 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:22:29.030767 systemd[1]: Finished network-cleanup.service. Dec 13 14:22:29.030775 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:22:29.030783 systemd[1]: Starting systemd-journald.service... Dec 13 14:22:29.030791 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:22:29.030799 systemd[1]: Starting systemd-resolved.service... Dec 13 14:22:29.030807 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:22:29.030814 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:22:29.030822 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:22:29.030830 kernel: audit: type=1130 audit(1734099749.021:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.030838 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:22:29.030848 systemd-journald[197]: Journal started Dec 13 14:22:29.030891 systemd-journald[197]: Runtime Journal (/run/log/journal/dfa6256453dd4501b6fb122af9bc1b19) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:22:29.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.027527 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 14:22:29.033497 systemd[1]: Started systemd-journald.service. Dec 13 14:22:29.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.034570 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:22:29.042434 kernel: audit: type=1130 audit(1734099749.033:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.042457 kernel: audit: type=1130 audit(1734099749.037:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.038042 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:22:29.060952 kernel: audit: type=1130 audit(1734099749.042:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.044184 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:22:29.073300 systemd-resolved[199]: Positive Trust Anchors: Dec 13 14:22:29.073332 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:22:29.073372 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:22:29.074621 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:22:29.079502 kernel: audit: type=1130 audit(1734099749.075:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.078189 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 14:22:29.079274 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:22:29.084327 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:22:29.084547 systemd[1]: Started systemd-resolved.service. Dec 13 14:22:29.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.086552 systemd[1]: Reached target nss-lookup.target. Dec 13 14:22:29.089954 dracut-cmdline[215]: dracut-dracut-053 Dec 13 14:22:29.092575 kernel: audit: type=1130 audit(1734099749.086:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.092596 kernel: Bridge firewalling registered Dec 13 14:22:29.092581 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 14:22:29.095462 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:22:29.112433 kernel: SCSI subsystem initialized Dec 13 14:22:29.123799 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:22:29.123858 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:22:29.123869 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:22:29.127836 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 14:22:29.128844 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:22:29.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.132052 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:22:29.136210 kernel: audit: type=1130 audit(1734099749.130:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.139873 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:22:29.144456 kernel: audit: type=1130 audit(1734099749.139:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.161335 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:22:29.178344 kernel: iscsi: registered transport (tcp) Dec 13 14:22:29.226345 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:22:29.226388 kernel: QLogic iSCSI HBA Driver Dec 13 14:22:29.254442 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:22:29.265860 kernel: audit: type=1130 audit(1734099749.262:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.263037 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:22:29.308361 kernel: raid6: avx2x4 gen() 30710 MB/s Dec 13 14:22:29.325343 kernel: raid6: avx2x4 xor() 8514 MB/s Dec 13 14:22:29.342342 kernel: raid6: avx2x2 gen() 32296 MB/s Dec 13 14:22:29.398375 kernel: raid6: avx2x2 xor() 19075 MB/s Dec 13 14:22:29.415348 kernel: raid6: avx2x1 gen() 26181 MB/s Dec 13 14:22:29.466352 kernel: raid6: avx2x1 xor() 14960 MB/s Dec 13 14:22:29.483348 kernel: raid6: sse2x4 gen() 14449 MB/s Dec 13 14:22:29.523365 kernel: raid6: sse2x4 xor() 7698 MB/s Dec 13 14:22:29.540346 kernel: raid6: sse2x2 gen() 15953 MB/s Dec 13 14:22:29.561357 kernel: raid6: sse2x2 xor() 9421 MB/s Dec 13 14:22:29.602381 kernel: raid6: sse2x1 gen() 11727 MB/s Dec 13 14:22:29.619791 kernel: raid6: sse2x1 xor() 7712 MB/s Dec 13 14:22:29.619844 kernel: raid6: using algorithm avx2x2 gen() 32296 MB/s Dec 13 14:22:29.619855 kernel: raid6: .... xor() 19075 MB/s, rmw enabled Dec 13 14:22:29.620496 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:22:29.633358 kernel: xor: automatically using best checksumming function avx Dec 13 14:22:29.723344 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:22:29.732855 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:22:29.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.734000 audit: BPF prog-id=7 op=LOAD Dec 13 14:22:29.734000 audit: BPF prog-id=8 op=LOAD Dec 13 14:22:29.735602 systemd[1]: Starting systemd-udevd.service... Dec 13 14:22:29.748520 systemd-udevd[400]: Using default interface naming scheme 'v252'. Dec 13 14:22:29.752479 systemd[1]: Started systemd-udevd.service. Dec 13 14:22:29.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.756453 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:22:29.767475 dracut-pre-trigger[413]: rd.md=0: removing MD RAID activation Dec 13 14:22:29.799208 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:22:29.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.801419 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:22:29.860352 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:22:29.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:29.881482 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 14:22:29.905913 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:22:29.905930 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:22:29.905942 kernel: GPT:9289727 != 19775487 Dec 13 14:22:29.905951 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:22:29.905962 kernel: GPT:9289727 != 19775487 Dec 13 14:22:29.905970 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:22:29.905978 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:22:29.905987 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:22:29.909325 kernel: AES CTR mode by8 optimization enabled Dec 13 14:22:29.918436 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:22:29.931175 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (450) Dec 13 14:22:29.931200 kernel: libata version 3.00 loaded. Dec 13 14:22:29.920345 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:22:29.928119 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:22:29.937326 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:22:29.940568 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 14:22:29.959736 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 14:22:29.959756 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 14:22:29.959889 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 14:22:29.960006 kernel: scsi host0: ahci Dec 13 14:22:29.960140 kernel: scsi host1: ahci Dec 13 14:22:29.960258 kernel: scsi host2: ahci Dec 13 14:22:29.960397 kernel: scsi host3: ahci Dec 13 14:22:29.960512 kernel: scsi host4: ahci Dec 13 14:22:29.960630 kernel: scsi host5: ahci Dec 13 14:22:29.960730 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 14:22:29.960741 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 14:22:29.960750 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 14:22:29.960759 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 14:22:29.960767 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 14:22:29.960776 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 14:22:29.948969 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:22:29.955952 systemd[1]: Starting disk-uuid.service... Dec 13 14:22:29.963653 disk-uuid[528]: Primary Header is updated. Dec 13 14:22:29.963653 disk-uuid[528]: Secondary Entries is updated. Dec 13 14:22:29.963653 disk-uuid[528]: Secondary Header is updated. Dec 13 14:22:29.967343 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:22:29.970335 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:22:30.268434 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:30.268508 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:30.268518 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:30.268527 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:30.270343 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 14:22:30.271340 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 14:22:30.271357 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 14:22:30.272768 kernel: ata3.00: applying bridge limits Dec 13 14:22:30.273492 kernel: ata3.00: configured for UDMA/100 Dec 13 14:22:30.274341 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 14:22:30.307883 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 14:22:30.325155 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:22:30.325172 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:22:30.971343 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:22:30.971592 disk-uuid[532]: The operation has completed successfully. Dec 13 14:22:30.995800 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:22:30.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:30.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:30.995896 systemd[1]: Finished disk-uuid.service. Dec 13 14:22:31.002683 systemd[1]: Starting verity-setup.service... Dec 13 14:22:31.018338 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 14:22:31.036829 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:22:31.039455 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:22:31.042872 systemd[1]: Finished verity-setup.service. Dec 13 14:22:31.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.102358 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:22:31.102591 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:22:31.104393 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:22:31.106566 systemd[1]: Starting ignition-setup.service... Dec 13 14:22:31.108754 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:22:31.192995 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:22:31.193066 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:22:31.193089 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:22:31.202460 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:22:31.211830 systemd[1]: Finished ignition-setup.service. Dec 13 14:22:31.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.214394 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:22:31.242867 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:22:31.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.286000 audit: BPF prog-id=9 op=LOAD Dec 13 14:22:31.287519 systemd[1]: Starting systemd-networkd.service... Dec 13 14:22:31.308753 systemd-networkd[719]: lo: Link UP Dec 13 14:22:31.308762 systemd-networkd[719]: lo: Gained carrier Dec 13 14:22:31.310661 systemd-networkd[719]: Enumeration completed Dec 13 14:22:31.310780 systemd[1]: Started systemd-networkd.service. Dec 13 14:22:31.312708 systemd[1]: Reached target network.target. Dec 13 14:22:31.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.315363 systemd[1]: Starting iscsiuio.service... Dec 13 14:22:31.318019 systemd-networkd[719]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:22:31.320876 systemd-networkd[719]: eth0: Link UP Dec 13 14:22:31.320886 systemd-networkd[719]: eth0: Gained carrier Dec 13 14:22:31.347400 ignition[677]: Ignition 2.14.0 Dec 13 14:22:31.347413 ignition[677]: Stage: fetch-offline Dec 13 14:22:31.347491 ignition[677]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:31.347503 ignition[677]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:31.347637 ignition[677]: parsed url from cmdline: "" Dec 13 14:22:31.347641 ignition[677]: no config URL provided Dec 13 14:22:31.347647 ignition[677]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:22:31.347661 ignition[677]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:22:31.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.347682 ignition[677]: op(1): [started] loading QEMU firmware config module Dec 13 14:22:31.353770 systemd[1]: Started iscsiuio.service. Dec 13 14:22:31.347698 ignition[677]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 14:22:31.354858 systemd[1]: Starting iscsid.service... Dec 13 14:22:31.391664 iscsid[731]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:22:31.391664 iscsid[731]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:22:31.391664 iscsid[731]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:22:31.391664 iscsid[731]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:22:31.391664 iscsid[731]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:22:31.391664 iscsid[731]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:22:31.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.394020 ignition[677]: op(1): [finished] loading QEMU firmware config module Dec 13 14:22:31.392907 systemd[1]: Started iscsid.service. Dec 13 14:22:31.395068 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:22:31.403365 systemd-networkd[719]: eth0: DHCPv4 address 10.0.0.64/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:22:31.406693 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:22:31.407969 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:22:31.410155 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:22:31.412222 systemd[1]: Reached target remote-fs.target. Dec 13 14:22:31.413983 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:22:31.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.420834 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:22:31.457540 ignition[677]: parsing config with SHA512: beb00bfbd05162f0d54f7ca029bb52481cf62ae554c705d79e4de67289a1f08bceda6aebdc62a7610af1cb8b08b31c799bdd1e866419c9f104bbee4f024e0356 Dec 13 14:22:31.473473 unknown[677]: fetched base config from "system" Dec 13 14:22:31.473486 unknown[677]: fetched user config from "qemu" Dec 13 14:22:31.474037 ignition[677]: fetch-offline: fetch-offline passed Dec 13 14:22:31.474106 ignition[677]: Ignition finished successfully Dec 13 14:22:31.477709 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:22:31.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.478040 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:22:31.478758 systemd[1]: Starting ignition-kargs.service... Dec 13 14:22:31.492081 ignition[746]: Ignition 2.14.0 Dec 13 14:22:31.492091 ignition[746]: Stage: kargs Dec 13 14:22:31.492180 ignition[746]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:31.492189 ignition[746]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:31.496024 ignition[746]: kargs: kargs passed Dec 13 14:22:31.496693 ignition[746]: Ignition finished successfully Dec 13 14:22:31.498225 systemd[1]: Finished ignition-kargs.service. Dec 13 14:22:31.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.499331 systemd[1]: Starting ignition-disks.service... Dec 13 14:22:31.508004 ignition[752]: Ignition 2.14.0 Dec 13 14:22:31.508014 ignition[752]: Stage: disks Dec 13 14:22:31.508256 ignition[752]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:31.508286 ignition[752]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:31.513012 ignition[752]: disks: disks passed Dec 13 14:22:31.513770 ignition[752]: Ignition finished successfully Dec 13 14:22:31.515550 systemd[1]: Finished ignition-disks.service. Dec 13 14:22:31.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.516162 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:22:31.517663 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:22:31.517982 systemd[1]: Reached target local-fs.target. Dec 13 14:22:31.520769 systemd[1]: Reached target sysinit.target. Dec 13 14:22:31.522279 systemd[1]: Reached target basic.target. Dec 13 14:22:31.524493 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:22:31.539188 systemd-fsck[760]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:22:31.545025 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:22:31.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.546395 systemd[1]: Mounting sysroot.mount... Dec 13 14:22:31.558335 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:22:31.558534 systemd[1]: Mounted sysroot.mount. Dec 13 14:22:31.559989 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:22:31.562506 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:22:31.564143 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:22:31.564178 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:22:31.564196 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:22:31.569534 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:22:31.571597 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:22:31.576131 initrd-setup-root[770]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:22:31.580510 initrd-setup-root[778]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:22:31.583781 initrd-setup-root[786]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:22:31.587499 initrd-setup-root[794]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:22:31.620442 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:22:31.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.623933 systemd[1]: Starting ignition-mount.service... Dec 13 14:22:31.626749 systemd[1]: Starting sysroot-boot.service... Dec 13 14:22:31.632775 bash[811]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:22:31.651178 systemd[1]: Finished sysroot-boot.service. Dec 13 14:22:31.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:31.652943 ignition[812]: INFO : Ignition 2.14.0 Dec 13 14:22:31.652943 ignition[812]: INFO : Stage: mount Dec 13 14:22:31.652943 ignition[812]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:31.652943 ignition[812]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:31.656961 ignition[812]: INFO : mount: mount passed Dec 13 14:22:31.656961 ignition[812]: INFO : Ignition finished successfully Dec 13 14:22:31.658643 systemd[1]: Finished ignition-mount.service. Dec 13 14:22:31.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:32.049579 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:22:32.057334 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (821) Dec 13 14:22:32.059558 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:22:32.059580 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:22:32.059593 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:22:32.063198 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:22:32.065774 systemd[1]: Starting ignition-files.service... Dec 13 14:22:32.079943 ignition[841]: INFO : Ignition 2.14.0 Dec 13 14:22:32.079943 ignition[841]: INFO : Stage: files Dec 13 14:22:32.081834 ignition[841]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:32.081834 ignition[841]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:32.081834 ignition[841]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:22:32.086030 ignition[841]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:22:32.086030 ignition[841]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:22:32.088853 ignition[841]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:22:32.090444 ignition[841]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:22:32.092411 unknown[841]: wrote ssh authorized keys file for user: core Dec 13 14:22:32.093630 ignition[841]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:22:32.095728 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:22:32.097729 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:22:32.154466 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:22:32.269175 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:22:32.269175 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:22:32.273598 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:22:32.738349 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 14:22:33.058454 systemd-networkd[719]: eth0: Gained IPv6LL Dec 13 14:22:33.455154 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:22:33.455154 ignition[841]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:22:33.460060 ignition[841]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:22:33.492207 ignition[841]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:22:33.493953 ignition[841]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:22:33.493953 ignition[841]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:22:33.493953 ignition[841]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:22:33.493953 ignition[841]: INFO : files: files passed Dec 13 14:22:33.493953 ignition[841]: INFO : Ignition finished successfully Dec 13 14:22:33.501350 systemd[1]: Finished ignition-files.service. Dec 13 14:22:33.507155 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:22:33.507179 kernel: audit: type=1130 audit(1734099753.501:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.507179 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:22:33.507658 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:22:33.508278 systemd[1]: Starting ignition-quench.service... Dec 13 14:22:33.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.510969 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:22:33.519152 kernel: audit: type=1130 audit(1734099753.511:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.519174 kernel: audit: type=1131 audit(1734099753.511:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.511048 systemd[1]: Finished ignition-quench.service. Dec 13 14:22:33.520873 initrd-setup-root-after-ignition[867]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 14:22:33.525865 kernel: audit: type=1130 audit(1734099753.520:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.516438 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:22:33.528521 initrd-setup-root-after-ignition[869]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:22:33.520824 systemd[1]: Reached target ignition-complete.target. Dec 13 14:22:33.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.523095 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:22:33.544624 kernel: audit: type=1130 audit(1734099753.536:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.544653 kernel: audit: type=1131 audit(1734099753.536:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.535713 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:22:33.535822 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:22:33.536664 systemd[1]: Reached target initrd-fs.target. Dec 13 14:22:33.545755 systemd[1]: Reached target initrd.target. Dec 13 14:22:33.546365 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:22:33.547148 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:22:33.558758 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:22:33.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.559722 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:22:33.564804 kernel: audit: type=1130 audit(1734099753.558:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.568882 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:22:33.569207 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:22:33.570678 systemd[1]: Stopped target timers.target. Dec 13 14:22:33.572403 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:22:33.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.572488 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:22:33.573850 systemd[1]: Stopped target initrd.target. Dec 13 14:22:33.579865 kernel: audit: type=1131 audit(1734099753.573:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.579576 systemd[1]: Stopped target basic.target. Dec 13 14:22:33.580133 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:22:33.583178 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:22:33.583776 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:22:33.585648 systemd[1]: Stopped target remote-fs.target. Dec 13 14:22:33.587162 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:22:33.589788 systemd[1]: Stopped target sysinit.target. Dec 13 14:22:33.590392 systemd[1]: Stopped target local-fs.target. Dec 13 14:22:33.591795 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:22:33.593236 systemd[1]: Stopped target swap.target. Dec 13 14:22:33.594797 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:22:33.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.594950 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:22:33.601821 kernel: audit: type=1131 audit(1734099753.595:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.596287 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:22:33.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.600728 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:22:33.607927 kernel: audit: type=1131 audit(1734099753.602:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.600879 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:22:33.602426 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:22:33.602544 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:22:33.606793 systemd[1]: Stopped target paths.target. Dec 13 14:22:33.608611 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:22:33.613403 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:22:33.615388 systemd[1]: Stopped target slices.target. Dec 13 14:22:33.626703 systemd[1]: Stopped target sockets.target. Dec 13 14:22:33.628266 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:22:33.628415 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:22:33.630480 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:22:33.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.630566 systemd[1]: Stopped ignition-files.service. Dec 13 14:22:33.632955 systemd[1]: Stopping ignition-mount.service... Dec 13 14:22:33.633420 systemd[1]: Stopping iscsid.service... Dec 13 14:22:33.642495 ignition[882]: INFO : Ignition 2.14.0 Dec 13 14:22:33.642495 ignition[882]: INFO : Stage: umount Dec 13 14:22:33.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.645657 iscsid[731]: iscsid shutting down. Dec 13 14:22:33.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.635786 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:22:33.647737 ignition[882]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:22:33.647737 ignition[882]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:22:33.647737 ignition[882]: INFO : umount: umount passed Dec 13 14:22:33.647737 ignition[882]: INFO : Ignition finished successfully Dec 13 14:22:33.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.643239 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:22:33.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.643475 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:22:33.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.644052 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:22:33.644165 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:22:33.647552 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:22:33.647663 systemd[1]: Stopped iscsid.service. Dec 13 14:22:33.648682 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:22:33.648749 systemd[1]: Stopped ignition-mount.service. Dec 13 14:22:33.650218 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:22:33.650292 systemd[1]: Closed iscsid.socket. Dec 13 14:22:33.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.651829 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:22:33.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.651863 systemd[1]: Stopped ignition-disks.service. Dec 13 14:22:33.652268 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:22:33.652331 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:22:33.655165 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:22:33.655199 systemd[1]: Stopped ignition-setup.service. Dec 13 14:22:33.657094 systemd[1]: Stopping iscsiuio.service... Dec 13 14:22:33.658682 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:22:33.658752 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:22:33.661488 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:22:33.661605 systemd[1]: Stopped iscsiuio.service. Dec 13 14:22:33.667196 systemd[1]: Stopped target network.target. Dec 13 14:22:33.667947 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:22:33.667989 systemd[1]: Closed iscsiuio.socket. Dec 13 14:22:33.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.668454 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:22:33.672184 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:22:33.677723 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:22:33.678642 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:22:33.678762 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:22:33.689000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:22:33.689398 systemd-networkd[719]: eth0: DHCPv6 lease lost Dec 13 14:22:33.691396 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:22:33.691520 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:22:33.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.694531 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:22:33.694571 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:22:33.697096 systemd[1]: Stopping network-cleanup.service... Dec 13 14:22:33.697000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:22:33.697582 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:22:33.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.697637 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:22:33.697969 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:22:33.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.698010 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:22:33.701179 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:22:33.701223 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:22:33.701867 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:22:33.706531 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:22:33.711131 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:22:33.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.711227 systemd[1]: Stopped network-cleanup.service. Dec 13 14:22:33.713205 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:22:33.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.713788 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:22:33.715590 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:22:33.715729 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:22:33.717560 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:22:33.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.717598 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:22:33.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.719467 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:22:33.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.719514 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:22:33.721384 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:22:33.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.721427 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:22:33.723591 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:22:33.723638 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:22:33.725691 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:22:33.726682 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:22:33.726735 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:22:33.728059 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:22:33.728103 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:22:33.730078 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:22:33.730130 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:22:33.732131 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:22:33.732668 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:22:33.732758 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:22:33.752077 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:22:33.752174 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:22:33.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.754094 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:22:33.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.755547 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:22:33.755585 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:22:33.756764 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:22:33.772461 systemd[1]: Switching root. Dec 13 14:22:33.791929 systemd-journald[197]: Journal stopped Dec 13 14:22:36.911485 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Dec 13 14:22:36.911542 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:22:36.911569 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:22:36.911580 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:22:36.911589 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:22:36.911599 kernel: SELinux: policy capability open_perms=1 Dec 13 14:22:36.911618 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:22:36.911633 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:22:36.911643 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:22:36.911652 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:22:36.911665 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:22:36.911675 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:22:36.911685 systemd[1]: Successfully loaded SELinux policy in 42.920ms. Dec 13 14:22:36.911702 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.246ms. Dec 13 14:22:36.911718 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:22:36.911798 systemd[1]: Detected virtualization kvm. Dec 13 14:22:36.911809 systemd[1]: Detected architecture x86-64. Dec 13 14:22:36.911822 systemd[1]: Detected first boot. Dec 13 14:22:36.911836 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:22:36.911864 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:22:36.911875 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:22:36.911885 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:22:36.911905 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:22:36.911919 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:22:36.911999 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:22:36.912010 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:22:36.912031 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:22:36.912062 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:22:36.912073 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:22:36.912087 systemd[1]: Created slice system-getty.slice. Dec 13 14:22:36.912097 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:22:36.912107 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:22:36.912120 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:22:36.912133 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:22:36.912145 systemd[1]: Created slice user.slice. Dec 13 14:22:36.912155 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:22:36.912173 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:22:36.912184 systemd[1]: Set up automount boot.automount. Dec 13 14:22:36.912194 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:22:36.912204 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:22:36.912214 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:22:36.912225 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:22:36.912235 systemd[1]: Reached target integritysetup.target. Dec 13 14:22:36.912255 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:22:36.912265 systemd[1]: Reached target remote-fs.target. Dec 13 14:22:36.912275 systemd[1]: Reached target slices.target. Dec 13 14:22:36.912285 systemd[1]: Reached target swap.target. Dec 13 14:22:36.912295 systemd[1]: Reached target torcx.target. Dec 13 14:22:36.912305 systemd[1]: Reached target veritysetup.target. Dec 13 14:22:36.912332 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:22:36.912350 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:22:36.912360 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:22:36.912371 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:22:36.912388 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:22:36.912398 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:22:36.912410 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:22:36.912420 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:22:36.912430 systemd[1]: Mounting media.mount... Dec 13 14:22:36.912440 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:36.912453 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:22:36.912464 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:22:36.912474 systemd[1]: Mounting tmp.mount... Dec 13 14:22:36.912492 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:22:36.912503 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:36.912514 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:22:36.912524 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:22:36.912534 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:36.912543 systemd[1]: Starting modprobe@drm.service... Dec 13 14:22:36.912553 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:36.912563 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:22:36.912573 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:36.912592 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:22:36.912602 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:22:36.912612 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:22:36.912622 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:22:36.912632 kernel: fuse: init (API version 7.34) Dec 13 14:22:36.912643 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:22:36.912652 kernel: loop: module loaded Dec 13 14:22:36.912662 systemd[1]: Stopped systemd-journald.service. Dec 13 14:22:36.912673 systemd[1]: Starting systemd-journald.service... Dec 13 14:22:36.912689 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:22:36.912699 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:22:36.912709 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:22:36.912719 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:22:36.912732 systemd-journald[997]: Journal started Dec 13 14:22:36.912771 systemd-journald[997]: Runtime Journal (/run/log/journal/dfa6256453dd4501b6fb122af9bc1b19) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:22:33.867000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:22:34.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:22:34.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:22:34.243000 audit: BPF prog-id=10 op=LOAD Dec 13 14:22:34.243000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:22:34.243000 audit: BPF prog-id=11 op=LOAD Dec 13 14:22:34.243000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:22:34.277000 audit[915]: AVC avc: denied { associate } for pid=915 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:22:34.277000 audit[915]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558b2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=898 pid=915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:34.277000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:22:34.279000 audit[915]: AVC avc: denied { associate } for pid=915 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:22:34.279000 audit[915]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155989 a2=1ed a3=0 items=2 ppid=898 pid=915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:34.279000 audit: CWD cwd="/" Dec 13 14:22:34.279000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:34.279000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:34.279000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:22:36.782000 audit: BPF prog-id=12 op=LOAD Dec 13 14:22:36.782000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:22:36.782000 audit: BPF prog-id=13 op=LOAD Dec 13 14:22:36.782000 audit: BPF prog-id=14 op=LOAD Dec 13 14:22:36.782000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:22:36.782000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:22:36.783000 audit: BPF prog-id=15 op=LOAD Dec 13 14:22:36.783000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:22:36.783000 audit: BPF prog-id=16 op=LOAD Dec 13 14:22:36.783000 audit: BPF prog-id=17 op=LOAD Dec 13 14:22:36.783000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:22:36.783000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:22:36.784000 audit: BPF prog-id=18 op=LOAD Dec 13 14:22:36.784000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:22:36.784000 audit: BPF prog-id=19 op=LOAD Dec 13 14:22:36.784000 audit: BPF prog-id=20 op=LOAD Dec 13 14:22:36.784000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:22:36.784000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:22:36.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.798000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:22:36.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.894000 audit: BPF prog-id=21 op=LOAD Dec 13 14:22:36.894000 audit: BPF prog-id=22 op=LOAD Dec 13 14:22:36.895000 audit: BPF prog-id=23 op=LOAD Dec 13 14:22:36.895000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:22:36.895000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:22:36.910000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:22:36.910000 audit[997]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffd824d7f60 a2=4000 a3=7ffd824d7ffc items=0 ppid=1 pid=997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.910000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:22:34.276154 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:22:36.781228 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:22:34.276387 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:22:36.781238 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:22:34.276403 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:22:36.785072 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:22:34.276431 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:22:34.276440 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:22:34.276465 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:22:34.276476 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:22:34.276663 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:22:34.276694 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:22:36.914865 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:22:36.914883 systemd[1]: Stopped verity-setup.service. Dec 13 14:22:34.276705 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:22:34.276989 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:22:34.277026 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:22:34.277041 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:22:34.277054 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:22:34.277069 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:22:34.277081 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:22:36.514789 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:36.515049 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:36.515144 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:36.515376 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:36.515436 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:22:36.515507 /usr/lib/systemd/system-generators/torcx-generator[915]: time="2024-12-13T14:22:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:22:36.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.918342 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:36.920637 systemd[1]: Started systemd-journald.service. Dec 13 14:22:36.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.921200 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:22:36.922078 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:22:36.922888 systemd[1]: Mounted media.mount. Dec 13 14:22:36.923671 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:22:36.924561 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:22:36.925476 systemd[1]: Mounted tmp.mount. Dec 13 14:22:36.926476 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:22:36.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.927688 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:22:36.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.928785 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:22:36.928939 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:22:36.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.930048 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:36.930238 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:36.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.931322 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:22:36.931476 systemd[1]: Finished modprobe@drm.service. Dec 13 14:22:36.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.932506 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:36.932667 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:36.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.933796 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:22:36.933968 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:22:36.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.935003 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:36.935162 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:36.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.936436 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:22:36.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.937631 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:22:36.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.938883 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:22:36.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.940422 systemd[1]: Reached target network-pre.target. Dec 13 14:22:36.942620 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:22:36.944838 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:22:36.945760 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:22:36.947191 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:22:36.949600 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:22:36.950796 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:36.952066 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:22:36.953307 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:36.954551 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:22:36.955197 systemd-journald[997]: Time spent on flushing to /var/log/journal/dfa6256453dd4501b6fb122af9bc1b19 is 24.178ms for 1171 entries. Dec 13 14:22:36.955197 systemd-journald[997]: System Journal (/var/log/journal/dfa6256453dd4501b6fb122af9bc1b19) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:22:36.999673 systemd-journald[997]: Received client request to flush runtime journal. Dec 13 14:22:36.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:36.957941 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:22:36.961212 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:22:36.962663 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:22:37.000965 udevadm[1020]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:22:36.963918 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:22:36.965978 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:22:36.972587 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:22:36.981408 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:22:36.982767 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:22:36.986712 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:22:36.989129 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:22:37.000645 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:22:37.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.009523 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:22:37.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.406233 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:22:37.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.407000 audit: BPF prog-id=24 op=LOAD Dec 13 14:22:37.408000 audit: BPF prog-id=25 op=LOAD Dec 13 14:22:37.408000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:22:37.408000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:22:37.409116 systemd[1]: Starting systemd-udevd.service... Dec 13 14:22:37.425114 systemd-udevd[1024]: Using default interface naming scheme 'v252'. Dec 13 14:22:37.439485 systemd[1]: Started systemd-udevd.service. Dec 13 14:22:37.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.441000 audit: BPF prog-id=26 op=LOAD Dec 13 14:22:37.442528 systemd[1]: Starting systemd-networkd.service... Dec 13 14:22:37.446000 audit: BPF prog-id=27 op=LOAD Dec 13 14:22:37.446000 audit: BPF prog-id=28 op=LOAD Dec 13 14:22:37.446000 audit: BPF prog-id=29 op=LOAD Dec 13 14:22:37.447779 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:22:37.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.480479 systemd[1]: Started systemd-userdbd.service. Dec 13 14:22:37.494998 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:22:37.501206 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:22:37.522346 systemd-networkd[1033]: lo: Link UP Dec 13 14:22:37.522844 systemd-networkd[1033]: lo: Gained carrier Dec 13 14:22:37.523525 systemd-networkd[1033]: Enumeration completed Dec 13 14:22:37.523748 systemd[1]: Started systemd-networkd.service. Dec 13 14:22:37.523750 systemd-networkd[1033]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:22:37.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.525717 systemd-networkd[1033]: eth0: Link UP Dec 13 14:22:37.525816 systemd-networkd[1033]: eth0: Gained carrier Dec 13 14:22:37.538335 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:22:37.539000 audit[1035]: AVC avc: denied { confidentiality } for pid=1035 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:22:37.544508 systemd-networkd[1033]: eth0: DHCPv4 address 10.0.0.64/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:22:37.554332 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:22:37.561344 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 14:22:37.567254 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 14:22:37.567484 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 14:22:37.567638 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 14:22:37.539000 audit[1035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f6c2866640 a1=337fc a2=7f7c5e138bc5 a3=5 items=110 ppid=1024 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.539000 audit: CWD cwd="/" Dec 13 14:22:37.539000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=1 name=(null) inode=13734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=2 name=(null) inode=13734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=3 name=(null) inode=13735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=4 name=(null) inode=13734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=5 name=(null) inode=13736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=6 name=(null) inode=13734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=7 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=8 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=9 name=(null) inode=13738 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=10 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=11 name=(null) inode=13739 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=12 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=13 name=(null) inode=13740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=14 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=15 name=(null) inode=13741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=16 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=17 name=(null) inode=13742 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=18 name=(null) inode=13734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=19 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=20 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=21 name=(null) inode=13744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=22 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=23 name=(null) inode=13745 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=24 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=25 name=(null) inode=13746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=26 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=27 name=(null) inode=13747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=28 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=29 name=(null) inode=13748 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=30 name=(null) inode=13734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=31 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=32 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=33 name=(null) inode=13750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=34 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=35 name=(null) inode=13751 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=36 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=37 name=(null) inode=13752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=38 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=39 name=(null) inode=13753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=40 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=41 name=(null) inode=13754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=42 name=(null) inode=13734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=43 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=44 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=45 name=(null) inode=13756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=46 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=47 name=(null) inode=13757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=48 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=49 name=(null) inode=13758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=50 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=51 name=(null) inode=13759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=52 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=53 name=(null) inode=13760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=55 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=56 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=57 name=(null) inode=13762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=58 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=59 name=(null) inode=13763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=60 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=61 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=62 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=63 name=(null) inode=13765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=64 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=65 name=(null) inode=13766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=66 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=67 name=(null) inode=13767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=68 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=69 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=70 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=71 name=(null) inode=13769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=72 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=73 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=74 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=75 name=(null) inode=13771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=76 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=77 name=(null) inode=13772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=78 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=79 name=(null) inode=13773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=80 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=81 name=(null) inode=13774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=82 name=(null) inode=13770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=83 name=(null) inode=13775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=84 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=85 name=(null) inode=13776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=86 name=(null) inode=13776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=87 name=(null) inode=13777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=88 name=(null) inode=13776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=89 name=(null) inode=13778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=90 name=(null) inode=13776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=91 name=(null) inode=13779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=92 name=(null) inode=13776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=93 name=(null) inode=13780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=94 name=(null) inode=13776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=95 name=(null) inode=13781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=96 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=97 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=98 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=99 name=(null) inode=13783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=100 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=101 name=(null) inode=13784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=102 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=103 name=(null) inode=13785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=104 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=105 name=(null) inode=13786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=106 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=107 name=(null) inode=13787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PATH item=109 name=(null) inode=13028 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:37.539000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:22:37.578347 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:22:37.583336 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:22:37.640871 kernel: kvm: Nested Virtualization enabled Dec 13 14:22:37.640996 kernel: SVM: kvm: Nested Paging enabled Dec 13 14:22:37.641033 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 14:22:37.641694 kernel: SVM: Virtual GIF supported Dec 13 14:22:37.660328 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:22:37.684911 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:22:37.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.687692 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:22:37.694786 lvm[1060]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:22:37.724329 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:22:37.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.739073 systemd[1]: Reached target cryptsetup.target. Dec 13 14:22:37.741164 systemd[1]: Starting lvm2-activation.service... Dec 13 14:22:37.744779 lvm[1061]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:22:37.769291 systemd[1]: Finished lvm2-activation.service. Dec 13 14:22:37.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.770323 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:22:37.771191 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:22:37.771215 systemd[1]: Reached target local-fs.target. Dec 13 14:22:37.772025 systemd[1]: Reached target machines.target. Dec 13 14:22:37.773944 systemd[1]: Starting ldconfig.service... Dec 13 14:22:37.774967 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:37.775011 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:37.775837 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:22:37.777857 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:22:37.780732 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:22:37.783096 systemd[1]: Starting systemd-sysext.service... Dec 13 14:22:37.784413 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1063 (bootctl) Dec 13 14:22:37.785500 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:22:37.832477 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:22:37.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.791012 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:22:37.794708 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:22:37.833246 systemd-fsck[1071]: fsck.fat 4.2 (2021-01-31) Dec 13 14:22:37.833246 systemd-fsck[1071]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 14:22:37.797484 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:22:37.797623 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:22:37.821756 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:22:37.825360 systemd[1]: Mounting boot.mount... Dec 13 14:22:38.170425 systemd[1]: Mounted boot.mount. Dec 13 14:22:38.184474 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:22:38.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.189326 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:22:38.205337 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:22:38.214069 (sd-sysext)[1076]: Using extensions 'kubernetes'. Dec 13 14:22:38.214467 (sd-sysext)[1076]: Merged extensions into '/usr'. Dec 13 14:22:38.225139 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:22:38.225680 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:22:38.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.230228 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:38.231519 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:22:38.232538 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.233716 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:38.235531 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:38.237248 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:38.238117 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.238293 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:38.238513 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:38.241021 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:22:38.242036 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:38.242133 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:38.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.243230 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:38.243331 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:38.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.244469 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:38.244556 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:38.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.245674 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:38.245761 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.246511 systemd[1]: Finished systemd-sysext.service. Dec 13 14:22:38.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.247988 ldconfig[1062]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:22:38.248166 systemd[1]: Starting ensure-sysext.service... Dec 13 14:22:38.249849 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:22:38.254071 systemd[1]: Reloading. Dec 13 14:22:38.257757 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:22:38.258431 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:22:38.259948 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:22:38.305354 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-12-13T14:22:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:22:38.305393 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-12-13T14:22:38Z" level=info msg="torcx already run" Dec 13 14:22:38.364527 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:22:38.364542 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:22:38.382677 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:22:38.435000 audit: BPF prog-id=30 op=LOAD Dec 13 14:22:38.435000 audit: BPF prog-id=31 op=LOAD Dec 13 14:22:38.435000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:22:38.435000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:22:38.436000 audit: BPF prog-id=32 op=LOAD Dec 13 14:22:38.436000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:22:38.437000 audit: BPF prog-id=33 op=LOAD Dec 13 14:22:38.437000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:22:38.437000 audit: BPF prog-id=34 op=LOAD Dec 13 14:22:38.437000 audit: BPF prog-id=35 op=LOAD Dec 13 14:22:38.437000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:22:38.437000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:22:38.438000 audit: BPF prog-id=36 op=LOAD Dec 13 14:22:38.438000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:22:38.438000 audit: BPF prog-id=37 op=LOAD Dec 13 14:22:38.438000 audit: BPF prog-id=38 op=LOAD Dec 13 14:22:38.438000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:22:38.438000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:22:38.441552 systemd[1]: Finished ldconfig.service. Dec 13 14:22:38.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.443817 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:22:38.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.447764 systemd[1]: Starting audit-rules.service... Dec 13 14:22:38.449468 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:22:38.451399 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:22:38.452000 audit: BPF prog-id=39 op=LOAD Dec 13 14:22:38.453757 systemd[1]: Starting systemd-resolved.service... Dec 13 14:22:38.454000 audit: BPF prog-id=40 op=LOAD Dec 13 14:22:38.455796 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:22:38.459483 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:22:38.460773 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:22:38.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.465000 audit[1156]: SYSTEM_BOOT pid=1156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.463609 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:22:38.465062 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:38.465226 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.466328 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:38.468183 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:38.469929 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:38.470722 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.470818 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:38.470903 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:22:38.470989 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:38.471945 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:22:38.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.473322 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:38.473421 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:38.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.474738 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:38.474841 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:38.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.476171 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:38.476326 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:38.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.479229 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:38.479514 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.480789 systemd[1]: Starting systemd-update-done.service... Dec 13 14:22:38.483016 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:22:38.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.485981 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:38.486157 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.487228 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:38.489022 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:38.490570 augenrules[1168]: No rules Dec 13 14:22:38.490000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:22:38.490000 audit[1168]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde143ef70 a2=420 a3=0 items=0 ppid=1145 pid=1168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:38.490000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:22:38.490735 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:38.491582 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.491689 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:38.491782 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:22:38.491851 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:38.492716 systemd[1]: Finished audit-rules.service. Dec 13 14:22:38.493993 systemd[1]: Finished systemd-update-done.service. Dec 13 14:22:38.495201 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:38.495301 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:38.496467 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:38.496565 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:38.497835 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:38.497948 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:38.499103 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:38.499206 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.501604 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:38.501816 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.503087 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:38.504836 systemd[1]: Starting modprobe@drm.service... Dec 13 14:22:38.506708 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:38.508766 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:38.509712 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.509836 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:38.511129 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:22:38.512378 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:22:38.512473 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:38.513600 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:38.513727 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:38.514902 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:22:38.515031 systemd[1]: Finished modprobe@drm.service. Dec 13 14:22:38.516198 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:38.516300 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:38.517617 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:38.517718 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:38.519974 systemd[1]: Finished ensure-sysext.service. Dec 13 14:22:38.521806 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:38.521844 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:38.522687 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:22:39.783005 systemd-timesyncd[1152]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 14:22:39.783051 systemd[1]: Reached target time-set.target. Dec 13 14:22:39.783306 systemd-timesyncd[1152]: Initial clock synchronization to Fri 2024-12-13 14:22:39.782929 UTC. Dec 13 14:22:39.784621 systemd-resolved[1149]: Positive Trust Anchors: Dec 13 14:22:39.784639 systemd-resolved[1149]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:22:39.784676 systemd-resolved[1149]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:22:39.792774 systemd-resolved[1149]: Defaulting to hostname 'linux'. Dec 13 14:22:39.794436 systemd[1]: Started systemd-resolved.service. Dec 13 14:22:39.795468 systemd[1]: Reached target network.target. Dec 13 14:22:39.796354 systemd[1]: Reached target nss-lookup.target. Dec 13 14:22:39.797319 systemd[1]: Reached target sysinit.target. Dec 13 14:22:39.798375 systemd[1]: Started motdgen.path. Dec 13 14:22:39.799256 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:22:39.800665 systemd[1]: Started logrotate.timer. Dec 13 14:22:39.801608 systemd[1]: Started mdadm.timer. Dec 13 14:22:39.802452 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:22:39.803431 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:22:39.803456 systemd[1]: Reached target paths.target. Dec 13 14:22:39.804323 systemd[1]: Reached target timers.target. Dec 13 14:22:39.805669 systemd[1]: Listening on dbus.socket. Dec 13 14:22:39.807761 systemd[1]: Starting docker.socket... Dec 13 14:22:39.810817 systemd[1]: Listening on sshd.socket. Dec 13 14:22:39.811788 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:39.812225 systemd[1]: Listening on docker.socket. Dec 13 14:22:39.813233 systemd[1]: Reached target sockets.target. Dec 13 14:22:39.814218 systemd[1]: Reached target basic.target. Dec 13 14:22:39.815169 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:22:39.815193 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:22:39.816123 systemd[1]: Starting containerd.service... Dec 13 14:22:39.817762 systemd[1]: Starting dbus.service... Dec 13 14:22:39.819468 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:22:39.821455 systemd[1]: Starting extend-filesystems.service... Dec 13 14:22:39.823381 jq[1187]: false Dec 13 14:22:39.823006 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:22:39.824031 systemd[1]: Starting motdgen.service... Dec 13 14:22:39.825886 systemd[1]: Starting prepare-helm.service... Dec 13 14:22:39.827505 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:22:39.829428 systemd[1]: Starting sshd-keygen.service... Dec 13 14:22:39.832372 systemd[1]: Starting systemd-logind.service... Dec 13 14:22:39.833590 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:39.833663 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:22:39.834169 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:22:39.834927 systemd[1]: Starting update-engine.service... Dec 13 14:22:39.837234 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:22:39.841152 jq[1204]: true Dec 13 14:22:39.841769 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:22:39.841986 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:22:39.842289 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:22:39.843511 systemd[1]: Finished motdgen.service. Dec 13 14:22:39.845467 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:22:39.845654 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:22:39.849077 dbus-daemon[1186]: [system] SELinux support is enabled Dec 13 14:22:39.849195 systemd[1]: Started dbus.service. Dec 13 14:22:39.852214 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:22:39.856164 jq[1209]: true Dec 13 14:22:39.852259 systemd[1]: Reached target system-config.target. Dec 13 14:22:39.857684 tar[1208]: linux-amd64/helm Dec 13 14:22:39.853492 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:22:39.853511 systemd[1]: Reached target user-config.target. Dec 13 14:22:39.862798 extend-filesystems[1188]: Found loop1 Dec 13 14:22:39.864222 extend-filesystems[1188]: Found sr0 Dec 13 14:22:39.864222 extend-filesystems[1188]: Found vda Dec 13 14:22:39.864222 extend-filesystems[1188]: Found vda1 Dec 13 14:22:39.864222 extend-filesystems[1188]: Found vda2 Dec 13 14:22:39.864222 extend-filesystems[1188]: Found vda3 Dec 13 14:22:39.864222 extend-filesystems[1188]: Found usr Dec 13 14:22:39.864222 extend-filesystems[1188]: Found vda4 Dec 13 14:22:39.870313 extend-filesystems[1188]: Found vda6 Dec 13 14:22:39.870313 extend-filesystems[1188]: Found vda7 Dec 13 14:22:39.870313 extend-filesystems[1188]: Found vda9 Dec 13 14:22:39.870313 extend-filesystems[1188]: Checking size of /dev/vda9 Dec 13 14:22:39.878271 systemd-logind[1198]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:22:39.878296 systemd-logind[1198]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:22:39.878850 systemd-logind[1198]: New seat seat0. Dec 13 14:22:39.883551 systemd[1]: Started systemd-logind.service. Dec 13 14:22:39.891484 extend-filesystems[1188]: Resized partition /dev/vda9 Dec 13 14:22:39.897374 extend-filesystems[1236]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:22:39.899207 update_engine[1203]: I1213 14:22:39.896468 1203 main.cc:92] Flatcar Update Engine starting Dec 13 14:22:39.904203 systemd[1]: Started update-engine.service. Dec 13 14:22:39.904425 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 14:22:39.904467 update_engine[1203]: I1213 14:22:39.904211 1203 update_check_scheduler.cc:74] Next update check in 2m22s Dec 13 14:22:39.912694 env[1211]: time="2024-12-13T14:22:39.908663318Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:22:39.917748 systemd[1]: Started locksmithd.service. Dec 13 14:22:39.940280 env[1211]: time="2024-12-13T14:22:39.940222162Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:22:39.940612 env[1211]: time="2024-12-13T14:22:39.940594069Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:39.942095 env[1211]: time="2024-12-13T14:22:39.942043347Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:22:39.942095 env[1211]: time="2024-12-13T14:22:39.942086017Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:39.942365 env[1211]: time="2024-12-13T14:22:39.942323793Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:22:39.942365 env[1211]: time="2024-12-13T14:22:39.942359380Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:39.942447 env[1211]: time="2024-12-13T14:22:39.942371893Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:22:39.942447 env[1211]: time="2024-12-13T14:22:39.942382623Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:39.942447 env[1211]: time="2024-12-13T14:22:39.942443658Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:39.942679 env[1211]: time="2024-12-13T14:22:39.942642901Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:22:39.942808 env[1211]: time="2024-12-13T14:22:39.942779738Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:22:39.942808 env[1211]: time="2024-12-13T14:22:39.942802280Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:22:39.942897 env[1211]: time="2024-12-13T14:22:39.942849579Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:22:39.942897 env[1211]: time="2024-12-13T14:22:39.942863555Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:22:40.013532 systemd-networkd[1033]: eth0: Gained IPv6LL Dec 13 14:22:40.015344 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:22:40.016777 systemd[1]: Reached target network-online.target. Dec 13 14:22:40.019380 systemd[1]: Starting kubelet.service... Dec 13 14:22:40.048381 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 14:22:40.052182 locksmithd[1240]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:22:40.135158 extend-filesystems[1236]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:22:40.135158 extend-filesystems[1236]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:22:40.135158 extend-filesystems[1236]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 14:22:40.159079 extend-filesystems[1188]: Resized filesystem in /dev/vda9 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157291654Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157370743Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157384990Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157442117Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157476090Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157541022Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157554257Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157568353Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157580446Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157608719Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157621303Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157633325Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157823622Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:22:40.161483 env[1211]: time="2024-12-13T14:22:40.157950690Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:22:40.136257 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:22:40.161816 bash[1235]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:22:40.161899 sshd_keygen[1207]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158234102Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158274197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158287702Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158357453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158369987Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158381027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158390816Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158457831Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158471567Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158482778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158492837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158504519Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158637739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158651675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.164550 env[1211]: time="2024-12-13T14:22:40.158662896Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.136453 systemd[1]: Finished extend-filesystems.service. Dec 13 14:22:40.164957 env[1211]: time="2024-12-13T14:22:40.158687582Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:22:40.164957 env[1211]: time="2024-12-13T14:22:40.158702560Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:22:40.164957 env[1211]: time="2024-12-13T14:22:40.158712669Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:22:40.164957 env[1211]: time="2024-12-13T14:22:40.158732146Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:22:40.164957 env[1211]: time="2024-12-13T14:22:40.158778854Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:22:40.157204 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:22:40.161422 systemd[1]: Started containerd.service. Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.159977672Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.160032474Z" level=info msg="Connect containerd service" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.160077078Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.160662797Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.160781018Z" level=info msg="Start subscribing containerd event" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.160822777Z" level=info msg="Start recovering state" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.160876016Z" level=info msg="Start event monitor" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.160886236Z" level=info msg="Start snapshots syncer" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.160898398Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.160907856Z" level=info msg="Start streaming server" Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.161207648Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.161280635Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:22:40.165166 env[1211]: time="2024-12-13T14:22:40.161958707Z" level=info msg="containerd successfully booted in 0.254113s" Dec 13 14:22:40.173748 systemd[1]: Finished sshd-keygen.service. Dec 13 14:22:40.176101 systemd[1]: Starting issuegen.service... Dec 13 14:22:40.181161 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:22:40.181280 systemd[1]: Finished issuegen.service. Dec 13 14:22:40.183393 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:22:40.189471 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:22:40.192747 systemd[1]: Started getty@tty1.service. Dec 13 14:22:40.195148 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:22:40.196498 systemd[1]: Reached target getty.target. Dec 13 14:22:40.381107 tar[1208]: linux-amd64/LICENSE Dec 13 14:22:40.381285 tar[1208]: linux-amd64/README.md Dec 13 14:22:40.386197 systemd[1]: Finished prepare-helm.service. Dec 13 14:22:40.736616 systemd[1]: Started kubelet.service. Dec 13 14:22:40.740156 systemd[1]: Reached target multi-user.target. Dec 13 14:22:40.742567 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:22:40.749603 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:22:40.749781 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:22:40.751210 systemd[1]: Startup finished in 803ms (kernel) + 4.956s (initrd) + 5.674s (userspace) = 11.434s. Dec 13 14:22:41.212805 kubelet[1268]: E1213 14:22:41.212707 1268 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:22:41.214978 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:22:41.215145 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:22:44.808645 systemd[1]: Created slice system-sshd.slice. Dec 13 14:22:44.809659 systemd[1]: Started sshd@0-10.0.0.64:22-10.0.0.1:40122.service. Dec 13 14:22:44.851084 sshd[1278]: Accepted publickey for core from 10.0.0.1 port 40122 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:22:44.852817 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:44.860291 systemd[1]: Created slice user-500.slice. Dec 13 14:22:44.861240 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:22:44.862893 systemd-logind[1198]: New session 1 of user core. Dec 13 14:22:44.869390 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:22:44.870812 systemd[1]: Starting user@500.service... Dec 13 14:22:44.873367 (systemd)[1281]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:44.940114 systemd[1281]: Queued start job for default target default.target. Dec 13 14:22:44.940547 systemd[1281]: Reached target paths.target. Dec 13 14:22:44.940567 systemd[1281]: Reached target sockets.target. Dec 13 14:22:44.940579 systemd[1281]: Reached target timers.target. Dec 13 14:22:44.940589 systemd[1281]: Reached target basic.target. Dec 13 14:22:44.940622 systemd[1281]: Reached target default.target. Dec 13 14:22:44.940643 systemd[1281]: Startup finished in 62ms. Dec 13 14:22:44.940753 systemd[1]: Started user@500.service. Dec 13 14:22:44.941764 systemd[1]: Started session-1.scope. Dec 13 14:22:44.995196 systemd[1]: Started sshd@1-10.0.0.64:22-10.0.0.1:40138.service. Dec 13 14:22:45.035367 sshd[1290]: Accepted publickey for core from 10.0.0.1 port 40138 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:22:45.036800 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:45.041155 systemd-logind[1198]: New session 2 of user core. Dec 13 14:22:45.042423 systemd[1]: Started session-2.scope. Dec 13 14:22:45.097346 sshd[1290]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:45.100764 systemd[1]: Started sshd@2-10.0.0.64:22-10.0.0.1:40142.service. Dec 13 14:22:45.101170 systemd[1]: sshd@1-10.0.0.64:22-10.0.0.1:40138.service: Deactivated successfully. Dec 13 14:22:45.101761 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:22:45.102250 systemd-logind[1198]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:22:45.103079 systemd-logind[1198]: Removed session 2. Dec 13 14:22:45.143318 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 40142 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:22:45.144494 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:45.148092 systemd-logind[1198]: New session 3 of user core. Dec 13 14:22:45.148887 systemd[1]: Started session-3.scope. Dec 13 14:22:45.198526 sshd[1295]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:45.201959 systemd[1]: sshd@2-10.0.0.64:22-10.0.0.1:40142.service: Deactivated successfully. Dec 13 14:22:45.202534 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:22:45.203048 systemd-logind[1198]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:22:45.204032 systemd[1]: Started sshd@3-10.0.0.64:22-10.0.0.1:40156.service. Dec 13 14:22:45.204634 systemd-logind[1198]: Removed session 3. Dec 13 14:22:45.241365 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 40156 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:22:45.242497 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:45.246246 systemd-logind[1198]: New session 4 of user core. Dec 13 14:22:45.247008 systemd[1]: Started session-4.scope. Dec 13 14:22:45.302880 sshd[1302]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:45.305777 systemd[1]: sshd@3-10.0.0.64:22-10.0.0.1:40156.service: Deactivated successfully. Dec 13 14:22:45.306337 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:22:45.306782 systemd-logind[1198]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:22:45.307884 systemd[1]: Started sshd@4-10.0.0.64:22-10.0.0.1:40164.service. Dec 13 14:22:45.308449 systemd-logind[1198]: Removed session 4. Dec 13 14:22:45.345859 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 40164 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:22:45.347071 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:45.350493 systemd-logind[1198]: New session 5 of user core. Dec 13 14:22:45.351384 systemd[1]: Started session-5.scope. Dec 13 14:22:45.408005 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:22:45.408258 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:45.415580 dbus-daemon[1186]: \xd0]\xc0q\xa3U: received setenforce notice (enforcing=183139584) Dec 13 14:22:45.418036 sudo[1311]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:45.420023 sshd[1308]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:45.423901 systemd[1]: Started sshd@5-10.0.0.64:22-10.0.0.1:40178.service. Dec 13 14:22:45.424439 systemd[1]: sshd@4-10.0.0.64:22-10.0.0.1:40164.service: Deactivated successfully. Dec 13 14:22:45.424981 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:22:45.425588 systemd-logind[1198]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:22:45.426584 systemd-logind[1198]: Removed session 5. Dec 13 14:22:45.465766 sshd[1314]: Accepted publickey for core from 10.0.0.1 port 40178 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:22:45.467033 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:45.470659 systemd-logind[1198]: New session 6 of user core. Dec 13 14:22:45.471576 systemd[1]: Started session-6.scope. Dec 13 14:22:45.523877 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:22:45.524068 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:45.526687 sudo[1319]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:45.531554 sudo[1318]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:22:45.531749 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:45.540248 systemd[1]: Stopping audit-rules.service... Dec 13 14:22:45.540000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:22:45.541638 auditctl[1322]: No rules Dec 13 14:22:45.541998 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:22:45.542185 systemd[1]: Stopped audit-rules.service. Dec 13 14:22:45.542508 kernel: kauditd_printk_skb: 282 callbacks suppressed Dec 13 14:22:45.542554 kernel: audit: type=1305 audit(1734099765.540:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:22:45.540000 audit[1322]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd64b38b20 a2=420 a3=0 items=0 ppid=1 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.543848 systemd[1]: Starting audit-rules.service... Dec 13 14:22:45.550906 kernel: audit: type=1300 audit(1734099765.540:203): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd64b38b20 a2=420 a3=0 items=0 ppid=1 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.550947 kernel: audit: type=1327 audit(1734099765.540:203): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:22:45.540000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:22:45.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.556140 kernel: audit: type=1131 audit(1734099765.540:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.561732 augenrules[1339]: No rules Dec 13 14:22:45.562416 systemd[1]: Finished audit-rules.service. Dec 13 14:22:45.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.563252 sudo[1318]: pam_unix(sudo:session): session closed for user root Dec 13 14:22:45.564565 sshd[1314]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:45.561000 audit[1318]: USER_END pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.567770 systemd[1]: sshd@5-10.0.0.64:22-10.0.0.1:40178.service: Deactivated successfully. Dec 13 14:22:45.568345 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:22:45.568992 systemd-logind[1198]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:22:45.569914 systemd[1]: Started sshd@6-10.0.0.64:22-10.0.0.1:40188.service. Dec 13 14:22:45.571000 systemd-logind[1198]: Removed session 6. Dec 13 14:22:45.571741 kernel: audit: type=1130 audit(1734099765.561:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.571782 kernel: audit: type=1106 audit(1734099765.561:206): pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.571797 kernel: audit: type=1104 audit(1734099765.562:207): pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.562000 audit[1318]: CRED_DISP pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.564000 audit[1314]: USER_END pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:45.581320 kernel: audit: type=1106 audit(1734099765.564:208): pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:45.581382 kernel: audit: type=1104 audit(1734099765.564:209): pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:45.564000 audit[1314]: CRED_DISP pid=1314 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:45.585354 kernel: audit: type=1131 audit(1734099765.566:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.64:22-10.0.0.1:40178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.64:22-10.0.0.1:40178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.64:22-10.0.0.1:40188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.609000 audit[1345]: USER_ACCT pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:45.611304 sshd[1345]: Accepted publickey for core from 10.0.0.1 port 40188 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:22:45.610000 audit[1345]: CRED_ACQ pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:45.610000 audit[1345]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6a8650e0 a2=3 a3=0 items=0 ppid=1 pid=1345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.610000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:45.612527 sshd[1345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:45.616191 systemd-logind[1198]: New session 7 of user core. Dec 13 14:22:45.617067 systemd[1]: Started session-7.scope. Dec 13 14:22:45.620000 audit[1345]: USER_START pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:45.621000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:22:45.668000 audit[1349]: USER_ACCT pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.668000 audit[1349]: CRED_REFR pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.670145 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:22:45.670385 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:22:45.670000 audit[1349]: USER_START pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.690956 systemd[1]: Starting docker.service... Dec 13 14:22:45.785765 env[1361]: time="2024-12-13T14:22:45.785708776Z" level=info msg="Starting up" Dec 13 14:22:45.787651 env[1361]: time="2024-12-13T14:22:45.787607506Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:22:45.787651 env[1361]: time="2024-12-13T14:22:45.787637382Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:22:45.787733 env[1361]: time="2024-12-13T14:22:45.787662550Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:22:45.787733 env[1361]: time="2024-12-13T14:22:45.787673751Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:22:45.789281 env[1361]: time="2024-12-13T14:22:45.789257070Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:22:45.789408 env[1361]: time="2024-12-13T14:22:45.789382976Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:22:45.789524 env[1361]: time="2024-12-13T14:22:45.789497932Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:22:45.789613 env[1361]: time="2024-12-13T14:22:45.789591828Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:22:46.247713 env[1361]: time="2024-12-13T14:22:46.247666091Z" level=info msg="Loading containers: start." Dec 13 14:22:46.302000 audit[1395]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.302000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc73f6dc60 a2=0 a3=7ffc73f6dc4c items=0 ppid=1361 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:22:46.303000 audit[1397]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.303000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc408f3700 a2=0 a3=7ffc408f36ec items=0 ppid=1361 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:22:46.305000 audit[1399]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.305000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc98a79a90 a2=0 a3=7ffc98a79a7c items=0 ppid=1361 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:22:46.306000 audit[1401]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.306000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff6e559bc0 a2=0 a3=7fff6e559bac items=0 ppid=1361 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:22:46.308000 audit[1403]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.308000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc675c8b90 a2=0 a3=7ffc675c8b7c items=0 ppid=1361 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:22:46.324000 audit[1408]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.324000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc21c62020 a2=0 a3=7ffc21c6200c items=0 ppid=1361 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:22:46.334000 audit[1410]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.334000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffbc24f3c0 a2=0 a3=7fffbc24f3ac items=0 ppid=1361 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.334000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:22:46.335000 audit[1412]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.335000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd9d740ab0 a2=0 a3=7ffd9d740a9c items=0 ppid=1361 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.335000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:22:46.337000 audit[1414]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.337000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdbd73ad30 a2=0 a3=7ffdbd73ad1c items=0 ppid=1361 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.337000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:46.346000 audit[1418]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.346000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeedd8f020 a2=0 a3=7ffeedd8f00c items=0 ppid=1361 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:46.350000 audit[1419]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.350000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff675e1150 a2=0 a3=7fff675e113c items=0 ppid=1361 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.350000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:46.360346 kernel: Initializing XFRM netlink socket Dec 13 14:22:46.390295 env[1361]: time="2024-12-13T14:22:46.390245458Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:22:46.406000 audit[1427]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.406000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffea0ee2de0 a2=0 a3=7ffea0ee2dcc items=0 ppid=1361 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.406000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:22:46.416000 audit[1430]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.416000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe8a720010 a2=0 a3=7ffe8a71fffc items=0 ppid=1361 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:22:46.418000 audit[1433]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.418000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff83177000 a2=0 a3=7fff83176fec items=0 ppid=1361 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.418000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:22:46.420000 audit[1435]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.420000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcbd0bc5e0 a2=0 a3=7ffcbd0bc5cc items=0 ppid=1361 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.420000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:22:46.421000 audit[1437]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.421000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe4d37ef00 a2=0 a3=7ffe4d37eeec items=0 ppid=1361 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.421000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:22:46.423000 audit[1439]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.423000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffcf88250e0 a2=0 a3=7ffcf88250cc items=0 ppid=1361 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.423000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:22:46.425000 audit[1441]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.425000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc7e9a8290 a2=0 a3=7ffc7e9a827c items=0 ppid=1361 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.425000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:22:46.431000 audit[1444]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.431000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffc26568a0 a2=0 a3=7fffc265688c items=0 ppid=1361 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:22:46.433000 audit[1446]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.433000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffef23ffad0 a2=0 a3=7ffef23ffabc items=0 ppid=1361 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.433000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:22:46.434000 audit[1448]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.434000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff5a485730 a2=0 a3=7fff5a48571c items=0 ppid=1361 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.434000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:22:46.436000 audit[1450]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.436000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc19374e50 a2=0 a3=7ffc19374e3c items=0 ppid=1361 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:22:46.438042 systemd-networkd[1033]: docker0: Link UP Dec 13 14:22:46.444000 audit[1454]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.444000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc5ec0ff80 a2=0 a3=7ffc5ec0ff6c items=0 ppid=1361 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.444000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:46.449000 audit[1455]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:22:46.449000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff9abc6940 a2=0 a3=7fff9abc692c items=0 ppid=1361 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:22:46.451280 env[1361]: time="2024-12-13T14:22:46.451249813Z" level=info msg="Loading containers: done." Dec 13 14:22:46.459872 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck612282334-merged.mount: Deactivated successfully. Dec 13 14:22:46.466717 env[1361]: time="2024-12-13T14:22:46.466657337Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:22:46.466953 env[1361]: time="2024-12-13T14:22:46.466920551Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:22:46.467084 env[1361]: time="2024-12-13T14:22:46.467056646Z" level=info msg="Daemon has completed initialization" Dec 13 14:22:46.484962 systemd[1]: Started docker.service. Dec 13 14:22:46.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.492869 env[1361]: time="2024-12-13T14:22:46.492812267Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:22:47.179045 env[1211]: time="2024-12-13T14:22:47.178988132Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 14:22:47.767065 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount372850240.mount: Deactivated successfully. Dec 13 14:22:49.612696 env[1211]: time="2024-12-13T14:22:49.612633345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.614563 env[1211]: time="2024-12-13T14:22:49.614528038Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.616511 env[1211]: time="2024-12-13T14:22:49.616484988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.618491 env[1211]: time="2024-12-13T14:22:49.618459341Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.619177 env[1211]: time="2024-12-13T14:22:49.619143664Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 14:22:49.629967 env[1211]: time="2024-12-13T14:22:49.629923941Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 14:22:51.331478 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:22:51.341528 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 14:22:51.341593 kernel: audit: type=1130 audit(1734099771.330:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:51.341630 kernel: audit: type=1131 audit(1734099771.330:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:51.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:51.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:51.331725 systemd[1]: Stopped kubelet.service. Dec 13 14:22:51.333527 systemd[1]: Starting kubelet.service... Dec 13 14:22:51.414015 systemd[1]: Started kubelet.service. Dec 13 14:22:51.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:51.418351 kernel: audit: type=1130 audit(1734099771.412:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:51.548796 kubelet[1512]: E1213 14:22:51.548729 1512 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:22:51.551849 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:22:51.551970 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:22:51.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:22:51.556354 kernel: audit: type=1131 audit(1734099771.550:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:22:53.235298 env[1211]: time="2024-12-13T14:22:53.235223254Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:53.239471 env[1211]: time="2024-12-13T14:22:53.239417350Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:53.241822 env[1211]: time="2024-12-13T14:22:53.241754803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:53.244431 env[1211]: time="2024-12-13T14:22:53.244396538Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:53.245364 env[1211]: time="2024-12-13T14:22:53.245308969Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 14:22:53.256597 env[1211]: time="2024-12-13T14:22:53.256540081Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 14:22:55.356975 env[1211]: time="2024-12-13T14:22:55.356891650Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:55.358883 env[1211]: time="2024-12-13T14:22:55.358815839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:55.360934 env[1211]: time="2024-12-13T14:22:55.360884648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:55.362705 env[1211]: time="2024-12-13T14:22:55.362670688Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:55.363652 env[1211]: time="2024-12-13T14:22:55.363529478Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 14:22:55.379075 env[1211]: time="2024-12-13T14:22:55.379019207Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:22:57.678754 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1381321406.mount: Deactivated successfully. Dec 13 14:22:58.744462 env[1211]: time="2024-12-13T14:22:58.744401480Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:58.781671 env[1211]: time="2024-12-13T14:22:58.781607394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:58.788490 env[1211]: time="2024-12-13T14:22:58.788442052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:58.796248 env[1211]: time="2024-12-13T14:22:58.796186686Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:58.796705 env[1211]: time="2024-12-13T14:22:58.796667367Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:22:58.806399 env[1211]: time="2024-12-13T14:22:58.806370033Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:22:59.595184 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount775988797.mount: Deactivated successfully. Dec 13 14:23:00.651157 env[1211]: time="2024-12-13T14:23:00.651090302Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:00.654645 env[1211]: time="2024-12-13T14:23:00.654589404Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:00.657675 env[1211]: time="2024-12-13T14:23:00.657638392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:00.660203 env[1211]: time="2024-12-13T14:23:00.660178215Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:00.661022 env[1211]: time="2024-12-13T14:23:00.660992743Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:23:00.669892 env[1211]: time="2024-12-13T14:23:00.669858870Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:23:01.199168 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2682748255.mount: Deactivated successfully. Dec 13 14:23:01.206791 env[1211]: time="2024-12-13T14:23:01.206754401Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:01.208878 env[1211]: time="2024-12-13T14:23:01.208848678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:01.210381 env[1211]: time="2024-12-13T14:23:01.210322713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:01.228674 env[1211]: time="2024-12-13T14:23:01.228627601Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:01.229223 env[1211]: time="2024-12-13T14:23:01.229183814Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:23:01.239259 env[1211]: time="2024-12-13T14:23:01.238949137Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 14:23:01.581484 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:23:01.581699 systemd[1]: Stopped kubelet.service. Dec 13 14:23:01.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:01.582982 systemd[1]: Starting kubelet.service... Dec 13 14:23:01.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:01.587886 kernel: audit: type=1130 audit(1734099781.580:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:01.587951 kernel: audit: type=1131 audit(1734099781.580:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:01.658300 systemd[1]: Started kubelet.service. Dec 13 14:23:01.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:01.662358 kernel: audit: type=1130 audit(1734099781.657:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:01.953775 kubelet[1558]: E1213 14:23:01.953649 1558 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:23:01.955667 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:23:01.955804 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:23:01.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:23:01.959351 kernel: audit: type=1131 audit(1734099781.954:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:23:02.133119 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount894937879.mount: Deactivated successfully. Dec 13 14:23:04.938498 env[1211]: time="2024-12-13T14:23:04.938416199Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:04.940345 env[1211]: time="2024-12-13T14:23:04.940282128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:04.942258 env[1211]: time="2024-12-13T14:23:04.942190367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:04.943988 env[1211]: time="2024-12-13T14:23:04.943952311Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:04.944858 env[1211]: time="2024-12-13T14:23:04.944813356Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 14:23:07.124739 systemd[1]: Stopped kubelet.service. Dec 13 14:23:07.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.132704 systemd[1]: Starting kubelet.service... Dec 13 14:23:07.135547 kernel: audit: type=1130 audit(1734099787.123:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.135596 kernel: audit: type=1131 audit(1734099787.125:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.149455 systemd[1]: Reloading. Dec 13 14:23:07.215503 /usr/lib/systemd/system-generators/torcx-generator[1666]: time="2024-12-13T14:23:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:23:07.215543 /usr/lib/systemd/system-generators/torcx-generator[1666]: time="2024-12-13T14:23:07Z" level=info msg="torcx already run" Dec 13 14:23:07.728041 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:23:07.728058 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:23:07.745650 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:23:07.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.834349 kernel: audit: type=1400 audit(1734099787.818:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.834419 kernel: audit: type=1400 audit(1734099787.818:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.834447 kernel: audit: type=1400 audit(1734099787.818:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.837288 kernel: audit: type=1400 audit(1734099787.818:258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.840212 kernel: audit: type=1400 audit(1734099787.818:259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.858487 kernel: audit: type=1400 audit(1734099787.818:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.858549 kernel: audit: type=1400 audit(1734099787.818:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.865381 kernel: audit: type=1400 audit(1734099787.818:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit: BPF prog-id=46 op=LOAD Dec 13 14:23:07.833000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.838000 audit: BPF prog-id=47 op=LOAD Dec 13 14:23:07.838000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:23:07.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.854000 audit: BPF prog-id=48 op=LOAD Dec 13 14:23:07.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.864000 audit: BPF prog-id=49 op=LOAD Dec 13 14:23:07.864000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:23:07.864000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit: BPF prog-id=50 op=LOAD Dec 13 14:23:07.867000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.867000 audit: BPF prog-id=51 op=LOAD Dec 13 14:23:07.867000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit: BPF prog-id=52 op=LOAD Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.868000 audit: BPF prog-id=53 op=LOAD Dec 13 14:23:07.868000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:23:07.868000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit: BPF prog-id=54 op=LOAD Dec 13 14:23:07.869000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit: BPF prog-id=55 op=LOAD Dec 13 14:23:07.870000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit: BPF prog-id=56 op=LOAD Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.870000 audit: BPF prog-id=57 op=LOAD Dec 13 14:23:07.870000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:23:07.870000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit: BPF prog-id=58 op=LOAD Dec 13 14:23:07.871000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit: BPF prog-id=59 op=LOAD Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:07.871000 audit: BPF prog-id=60 op=LOAD Dec 13 14:23:07.871000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:23:07.871000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:23:07.883209 systemd[1]: Started kubelet.service. Dec 13 14:23:07.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.885285 systemd[1]: Stopping kubelet.service... Dec 13 14:23:07.885632 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:23:07.885844 systemd[1]: Stopped kubelet.service. Dec 13 14:23:07.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.887730 systemd[1]: Starting kubelet.service... Dec 13 14:23:07.962819 systemd[1]: Started kubelet.service. Dec 13 14:23:07.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:08.013195 kubelet[1716]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:23:08.013195 kubelet[1716]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:23:08.013195 kubelet[1716]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:23:08.014552 kubelet[1716]: I1213 14:23:08.014476 1716 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:23:08.244939 kubelet[1716]: I1213 14:23:08.244895 1716 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:23:08.244939 kubelet[1716]: I1213 14:23:08.244924 1716 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:23:08.245152 kubelet[1716]: I1213 14:23:08.245139 1716 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:23:08.264120 kubelet[1716]: I1213 14:23:08.263973 1716 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:23:08.265787 kubelet[1716]: E1213 14:23:08.265765 1716 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.64:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:08.276547 kubelet[1716]: I1213 14:23:08.276514 1716 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:23:08.278380 kubelet[1716]: I1213 14:23:08.278320 1716 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:23:08.278574 kubelet[1716]: I1213 14:23:08.278380 1716 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:23:08.279400 kubelet[1716]: I1213 14:23:08.279380 1716 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:23:08.279400 kubelet[1716]: I1213 14:23:08.279396 1716 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:23:08.279546 kubelet[1716]: I1213 14:23:08.279518 1716 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:23:08.280496 kubelet[1716]: I1213 14:23:08.280468 1716 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:23:08.280496 kubelet[1716]: I1213 14:23:08.280488 1716 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:23:08.280568 kubelet[1716]: I1213 14:23:08.280507 1716 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:23:08.280568 kubelet[1716]: I1213 14:23:08.280519 1716 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:23:08.281022 kubelet[1716]: W1213 14:23:08.280963 1716 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.64:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:08.281074 kubelet[1716]: E1213 14:23:08.281026 1716 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.64:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:08.281074 kubelet[1716]: W1213 14:23:08.281032 1716 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.64:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:08.281146 kubelet[1716]: E1213 14:23:08.281096 1716 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.64:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:08.287146 kubelet[1716]: I1213 14:23:08.287115 1716 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:23:08.290398 kubelet[1716]: I1213 14:23:08.290380 1716 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:23:08.290473 kubelet[1716]: W1213 14:23:08.290432 1716 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:23:08.290928 kubelet[1716]: I1213 14:23:08.290909 1716 server.go:1264] "Started kubelet" Dec 13 14:23:08.290000 audit[1716]: AVC avc: denied { mac_admin } for pid=1716 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:08.290000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:08.290000 audit[1716]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006a3e60 a1=c0009b6768 a2=c0006a3e30 a3=25 items=0 ppid=1 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.290000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:08.290000 audit[1716]: AVC avc: denied { mac_admin } for pid=1716 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:08.290000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:08.290000 audit[1716]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000701620 a1=c0009b6780 a2=c0006a3ef0 a3=25 items=0 ppid=1 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.290000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:08.292292 kubelet[1716]: I1213 14:23:08.291863 1716 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:23:08.292292 kubelet[1716]: I1213 14:23:08.291891 1716 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:23:08.292292 kubelet[1716]: I1213 14:23:08.291934 1716 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:23:08.293000 audit[1728]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:08.293000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebbea9210 a2=0 a3=7ffebbea91fc items=0 ppid=1716 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:23:08.294000 audit[1729]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:08.294000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe72c6ed10 a2=0 a3=7ffe72c6ecfc items=0 ppid=1716 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:23:08.296900 kubelet[1716]: I1213 14:23:08.296840 1716 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:23:08.297909 kubelet[1716]: I1213 14:23:08.297883 1716 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:23:08.298743 kubelet[1716]: I1213 14:23:08.298694 1716 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:23:08.298914 kubelet[1716]: I1213 14:23:08.298896 1716 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:23:08.306061 kubelet[1716]: E1213 14:23:08.306015 1716 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:23:08.306121 kubelet[1716]: I1213 14:23:08.306114 1716 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:23:08.306207 kubelet[1716]: E1213 14:23:08.305987 1716 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.64:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.64:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c291de288a8f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:23:08.290886287 +0000 UTC m=+0.324720107,LastTimestamp:2024-12-13 14:23:08.290886287 +0000 UTC m=+0.324720107,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:23:08.308389 kubelet[1716]: I1213 14:23:08.306283 1716 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:23:08.308389 kubelet[1716]: I1213 14:23:08.306542 1716 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:23:08.308389 kubelet[1716]: W1213 14:23:08.307281 1716 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.64:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:08.308389 kubelet[1716]: E1213 14:23:08.308048 1716 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.64:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:08.308389 kubelet[1716]: E1213 14:23:08.308150 1716 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.64:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.64:6443: connect: connection refused" interval="200ms" Dec 13 14:23:08.307000 audit[1732]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:08.307000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc88dbb80 a2=0 a3=7ffcc88dbb6c items=0 ppid=1716 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:08.309284 kubelet[1716]: I1213 14:23:08.309250 1716 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:23:08.311000 audit[1734]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:08.311000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6dd26170 a2=0 a3=7ffc6dd2615c items=0 ppid=1716 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:08.314989 kubelet[1716]: E1213 14:23:08.310371 1716 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:23:08.315124 kubelet[1716]: I1213 14:23:08.315066 1716 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:23:08.316581 kubelet[1716]: I1213 14:23:08.316552 1716 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:23:08.317000 audit[1739]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:08.317000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff0967aaf0 a2=0 a3=7fff0967aadc items=0 ppid=1716 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:23:08.319732 kubelet[1716]: I1213 14:23:08.319682 1716 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:23:08.319000 audit[1742]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:08.319000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0fdd30b0 a2=0 a3=7ffd0fdd309c items=0 ppid=1716 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:23:08.319000 audit[1741]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:08.319000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff2bf0c630 a2=0 a3=7fff2bf0c61c items=0 ppid=1716 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:23:08.321716 kubelet[1716]: I1213 14:23:08.321683 1716 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:23:08.321785 kubelet[1716]: I1213 14:23:08.321723 1716 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:23:08.321785 kubelet[1716]: I1213 14:23:08.321743 1716 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:23:08.321837 kubelet[1716]: E1213 14:23:08.321784 1716 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:23:08.322600 kubelet[1716]: W1213 14:23:08.322566 1716 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.64:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:08.322659 kubelet[1716]: E1213 14:23:08.322606 1716 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.64:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:08.321000 audit[1745]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:08.321000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff28e76020 a2=0 a3=7fff28e7600c items=0 ppid=1716 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:23:08.322000 audit[1744]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:08.322000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc96766e20 a2=0 a3=7ffc96766e0c items=0 ppid=1716 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:23:08.322000 audit[1746]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:08.322000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc24a4b3e0 a2=0 a3=7ffc24a4b3cc items=0 ppid=1716 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:23:08.323000 audit[1747]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:08.323000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdf528190 a2=0 a3=7fffdf52817c items=0 ppid=1716 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:23:08.323000 audit[1748]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:08.323000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd0e195c10 a2=0 a3=7ffd0e195bfc items=0 ppid=1716 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:08.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:23:08.329708 kubelet[1716]: I1213 14:23:08.329679 1716 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:23:08.329708 kubelet[1716]: I1213 14:23:08.329697 1716 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:23:08.329708 kubelet[1716]: I1213 14:23:08.329710 1716 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:23:08.411584 kubelet[1716]: I1213 14:23:08.411546 1716 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:23:08.412041 kubelet[1716]: E1213 14:23:08.412003 1716 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.64:6443/api/v1/nodes\": dial tcp 10.0.0.64:6443: connect: connection refused" node="localhost" Dec 13 14:23:08.422247 kubelet[1716]: E1213 14:23:08.422224 1716 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:23:08.509404 kubelet[1716]: E1213 14:23:08.509370 1716 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.64:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.64:6443: connect: connection refused" interval="400ms" Dec 13 14:23:08.614194 kubelet[1716]: I1213 14:23:08.614155 1716 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:23:08.614578 kubelet[1716]: E1213 14:23:08.614556 1716 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.64:6443/api/v1/nodes\": dial tcp 10.0.0.64:6443: connect: connection refused" node="localhost" Dec 13 14:23:08.622718 kubelet[1716]: E1213 14:23:08.622676 1716 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:23:08.910354 kubelet[1716]: E1213 14:23:08.910182 1716 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.64:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.64:6443: connect: connection refused" interval="800ms" Dec 13 14:23:08.982731 kubelet[1716]: I1213 14:23:08.982668 1716 policy_none.go:49] "None policy: Start" Dec 13 14:23:08.983517 kubelet[1716]: I1213 14:23:08.983491 1716 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:23:08.983584 kubelet[1716]: I1213 14:23:08.983542 1716 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:23:08.991726 systemd[1]: Created slice kubepods.slice. Dec 13 14:23:08.995756 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:23:08.998387 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:23:09.007364 kubelet[1716]: I1213 14:23:09.007286 1716 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:23:09.006000 audit[1716]: AVC avc: denied { mac_admin } for pid=1716 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:09.006000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:09.006000 audit[1716]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000afec30 a1=c000cd33b0 a2=c000afebd0 a3=25 items=0 ppid=1 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:09.006000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:09.007835 kubelet[1716]: I1213 14:23:09.007388 1716 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:23:09.007835 kubelet[1716]: I1213 14:23:09.007536 1716 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:23:09.007835 kubelet[1716]: I1213 14:23:09.007685 1716 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:23:09.031902 kubelet[1716]: I1213 14:23:09.030757 1716 topology_manager.go:215] "Topology Admit Handler" podUID="dc8854ce37bf7cfab78404e2d26defb1" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:23:09.032858 kubelet[1716]: I1213 14:23:09.032820 1716 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:23:09.033195 kubelet[1716]: E1213 14:23:09.033164 1716 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.64:6443/api/v1/nodes\": dial tcp 10.0.0.64:6443: connect: connection refused" node="localhost" Dec 13 14:23:09.033324 kubelet[1716]: I1213 14:23:09.033278 1716 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:23:09.034396 kubelet[1716]: I1213 14:23:09.034323 1716 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:23:09.037276 kubelet[1716]: E1213 14:23:09.037241 1716 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 14:23:09.039697 systemd[1]: Created slice kubepods-burstable-poddc8854ce37bf7cfab78404e2d26defb1.slice. Dec 13 14:23:09.050212 systemd[1]: Created slice kubepods-burstable-podb107a98bcf27297d642d248711a3fc70.slice. Dec 13 14:23:09.057837 systemd[1]: Created slice kubepods-burstable-pod8a50003978138b3ab9890682eff4eae8.slice. Dec 13 14:23:09.105947 kubelet[1716]: W1213 14:23:09.105848 1716 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.64:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:09.105947 kubelet[1716]: E1213 14:23:09.105940 1716 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.64:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:09.133428 kubelet[1716]: I1213 14:23:09.133362 1716 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:09.133428 kubelet[1716]: I1213 14:23:09.133416 1716 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:09.133679 kubelet[1716]: I1213 14:23:09.133475 1716 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:09.133679 kubelet[1716]: I1213 14:23:09.133544 1716 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:09.133679 kubelet[1716]: I1213 14:23:09.133616 1716 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:09.133679 kubelet[1716]: I1213 14:23:09.133641 1716 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:23:09.133679 kubelet[1716]: I1213 14:23:09.133662 1716 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dc8854ce37bf7cfab78404e2d26defb1-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"dc8854ce37bf7cfab78404e2d26defb1\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:23:09.133818 kubelet[1716]: I1213 14:23:09.133700 1716 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dc8854ce37bf7cfab78404e2d26defb1-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"dc8854ce37bf7cfab78404e2d26defb1\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:23:09.133818 kubelet[1716]: I1213 14:23:09.133784 1716 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dc8854ce37bf7cfab78404e2d26defb1-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"dc8854ce37bf7cfab78404e2d26defb1\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:23:09.317267 kubelet[1716]: W1213 14:23:09.317132 1716 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.64:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:09.317267 kubelet[1716]: E1213 14:23:09.317180 1716 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.64:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:09.323807 kubelet[1716]: W1213 14:23:09.323718 1716 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.64:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:09.323807 kubelet[1716]: E1213 14:23:09.323800 1716 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.64:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:09.348675 kubelet[1716]: E1213 14:23:09.348621 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:09.349354 env[1211]: time="2024-12-13T14:23:09.349263412Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:dc8854ce37bf7cfab78404e2d26defb1,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:09.356562 kubelet[1716]: E1213 14:23:09.356514 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:09.356998 env[1211]: time="2024-12-13T14:23:09.356964805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:09.360235 kubelet[1716]: E1213 14:23:09.360212 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:09.360629 env[1211]: time="2024-12-13T14:23:09.360585705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:09.422661 kubelet[1716]: W1213 14:23:09.422598 1716 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.64:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:09.422661 kubelet[1716]: E1213 14:23:09.422653 1716 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.64:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.64:6443: connect: connection refused Dec 13 14:23:09.711199 kubelet[1716]: E1213 14:23:09.711141 1716 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.64:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.64:6443: connect: connection refused" interval="1.6s" Dec 13 14:23:09.834723 kubelet[1716]: I1213 14:23:09.834668 1716 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:23:09.835019 kubelet[1716]: E1213 14:23:09.834987 1716 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.64:6443/api/v1/nodes\": dial tcp 10.0.0.64:6443: connect: connection refused" node="localhost" Dec 13 14:23:09.940828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1603898293.mount: Deactivated successfully. Dec 13 14:23:09.946237 env[1211]: time="2024-12-13T14:23:09.946179522Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.948999 env[1211]: time="2024-12-13T14:23:09.948945179Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.949953 env[1211]: time="2024-12-13T14:23:09.949914477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.951069 env[1211]: time="2024-12-13T14:23:09.951041210Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.954429 env[1211]: time="2024-12-13T14:23:09.954385802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.956204 env[1211]: time="2024-12-13T14:23:09.956169497Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.957345 env[1211]: time="2024-12-13T14:23:09.957304075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.958522 env[1211]: time="2024-12-13T14:23:09.958488246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.959816 env[1211]: time="2024-12-13T14:23:09.959777363Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.961476 env[1211]: time="2024-12-13T14:23:09.961391851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.963460 env[1211]: time="2024-12-13T14:23:09.963429282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.965498 env[1211]: time="2024-12-13T14:23:09.965471161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:09.980903 env[1211]: time="2024-12-13T14:23:09.980822180Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:09.980903 env[1211]: time="2024-12-13T14:23:09.980860421Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:09.980903 env[1211]: time="2024-12-13T14:23:09.980872354Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:09.981307 env[1211]: time="2024-12-13T14:23:09.981233161Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2946d651ce26e9324431dc91225e2b8f2a3bb765521bd74da429f096324f05dc pid=1758 runtime=io.containerd.runc.v2 Dec 13 14:23:09.994940 env[1211]: time="2024-12-13T14:23:09.994713391Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:09.994940 env[1211]: time="2024-12-13T14:23:09.994745741Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:09.994940 env[1211]: time="2024-12-13T14:23:09.994758676Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:09.994940 env[1211]: time="2024-12-13T14:23:09.993490407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:09.994940 env[1211]: time="2024-12-13T14:23:09.993522147Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:09.994940 env[1211]: time="2024-12-13T14:23:09.993535021Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:09.994940 env[1211]: time="2024-12-13T14:23:09.993683008Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d60c9e99693cdfeb7cc57f0c6378e84b6bde317290c16d4f086939448f8fbaa pid=1784 runtime=io.containerd.runc.v2 Dec 13 14:23:09.994940 env[1211]: time="2024-12-13T14:23:09.994927843Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7fc2dd940bbc4106ba3c802ab19bb1b2ca6b9fc5c1be238736576a6299c8710b pid=1786 runtime=io.containerd.runc.v2 Dec 13 14:23:10.000757 systemd[1]: Started cri-containerd-2946d651ce26e9324431dc91225e2b8f2a3bb765521bd74da429f096324f05dc.scope. Dec 13 14:23:10.016496 systemd[1]: Started cri-containerd-1d60c9e99693cdfeb7cc57f0c6378e84b6bde317290c16d4f086939448f8fbaa.scope. Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.021000 audit: BPF prog-id=61 op=LOAD Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1758 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239343664363531636532366539333234343331646339313232356532 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1758 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239343664363531636532366539333234343331646339313232356532 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit: BPF prog-id=62 op=LOAD Dec 13 14:23:10.022000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0004089c0 items=0 ppid=1758 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239343664363531636532366539333234343331646339313232356532 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit: BPF prog-id=63 op=LOAD Dec 13 14:23:10.022000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000408a08 items=0 ppid=1758 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239343664363531636532366539333234343331646339313232356532 Dec 13 14:23:10.022000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:23:10.022000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.022000 audit: BPF prog-id=64 op=LOAD Dec 13 14:23:10.022000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000408e18 items=0 ppid=1758 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239343664363531636532366539333234343331646339313232356532 Dec 13 14:23:10.025392 systemd[1]: Started cri-containerd-7fc2dd940bbc4106ba3c802ab19bb1b2ca6b9fc5c1be238736576a6299c8710b.scope. Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.029000 audit: BPF prog-id=65 op=LOAD Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1784 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363063396539393639336364666562376363353766306336333738 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1784 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363063396539393639336364666562376363353766306336333738 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit: BPF prog-id=66 op=LOAD Dec 13 14:23:10.030000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00030c6a0 items=0 ppid=1784 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363063396539393639336364666562376363353766306336333738 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit: BPF prog-id=67 op=LOAD Dec 13 14:23:10.030000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00030c6e8 items=0 ppid=1784 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363063396539393639336364666562376363353766306336333738 Dec 13 14:23:10.030000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:23:10.030000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.030000 audit: BPF prog-id=68 op=LOAD Dec 13 14:23:10.030000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00030caf8 items=0 ppid=1784 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363063396539393639336364666562376363353766306336333738 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.036000 audit: BPF prog-id=69 op=LOAD Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=1786 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766633264643934306262633431303662613363383032616231396262 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=1786 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766633264643934306262633431303662613363383032616231396262 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit: BPF prog-id=70 op=LOAD Dec 13 14:23:10.037000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0002857b0 items=0 ppid=1786 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766633264643934306262633431303662613363383032616231396262 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit: BPF prog-id=71 op=LOAD Dec 13 14:23:10.037000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0002857f8 items=0 ppid=1786 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766633264643934306262633431303662613363383032616231396262 Dec 13 14:23:10.037000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:23:10.037000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.037000 audit: BPF prog-id=72 op=LOAD Dec 13 14:23:10.037000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000285c08 items=0 ppid=1786 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766633264643934306262633431303662613363383032616231396262 Dec 13 14:23:10.055138 env[1211]: time="2024-12-13T14:23:10.054463333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,} returns sandbox id \"2946d651ce26e9324431dc91225e2b8f2a3bb765521bd74da429f096324f05dc\"" Dec 13 14:23:10.056743 kubelet[1716]: E1213 14:23:10.056674 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:10.067101 env[1211]: time="2024-12-13T14:23:10.067064505Z" level=info msg="CreateContainer within sandbox \"2946d651ce26e9324431dc91225e2b8f2a3bb765521bd74da429f096324f05dc\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:23:10.068195 env[1211]: time="2024-12-13T14:23:10.068150552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,} returns sandbox id \"7fc2dd940bbc4106ba3c802ab19bb1b2ca6b9fc5c1be238736576a6299c8710b\"" Dec 13 14:23:10.068985 kubelet[1716]: E1213 14:23:10.068795 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:10.070459 env[1211]: time="2024-12-13T14:23:10.070436499Z" level=info msg="CreateContainer within sandbox \"7fc2dd940bbc4106ba3c802ab19bb1b2ca6b9fc5c1be238736576a6299c8710b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:23:10.076048 env[1211]: time="2024-12-13T14:23:10.076005953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:dc8854ce37bf7cfab78404e2d26defb1,Namespace:kube-system,Attempt:0,} returns sandbox id \"1d60c9e99693cdfeb7cc57f0c6378e84b6bde317290c16d4f086939448f8fbaa\"" Dec 13 14:23:10.076833 kubelet[1716]: E1213 14:23:10.076808 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:10.078750 env[1211]: time="2024-12-13T14:23:10.078716166Z" level=info msg="CreateContainer within sandbox \"1d60c9e99693cdfeb7cc57f0c6378e84b6bde317290c16d4f086939448f8fbaa\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:23:10.092709 env[1211]: time="2024-12-13T14:23:10.092647081Z" level=info msg="CreateContainer within sandbox \"2946d651ce26e9324431dc91225e2b8f2a3bb765521bd74da429f096324f05dc\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"40ec0789c3cb2e69e7da7e14ef49c11d686aaa3bfb5acdd8f231e4ad0945d050\"" Dec 13 14:23:10.093375 env[1211]: time="2024-12-13T14:23:10.093323620Z" level=info msg="StartContainer for \"40ec0789c3cb2e69e7da7e14ef49c11d686aaa3bfb5acdd8f231e4ad0945d050\"" Dec 13 14:23:10.098583 env[1211]: time="2024-12-13T14:23:10.098556644Z" level=info msg="CreateContainer within sandbox \"7fc2dd940bbc4106ba3c802ab19bb1b2ca6b9fc5c1be238736576a6299c8710b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"26e81a57b156e2308394ed578e5afc3146c86080c1fd242b2a60ef2ca8b01e4d\"" Dec 13 14:23:10.099071 env[1211]: time="2024-12-13T14:23:10.099048597Z" level=info msg="StartContainer for \"26e81a57b156e2308394ed578e5afc3146c86080c1fd242b2a60ef2ca8b01e4d\"" Dec 13 14:23:10.104741 env[1211]: time="2024-12-13T14:23:10.104699875Z" level=info msg="CreateContainer within sandbox \"1d60c9e99693cdfeb7cc57f0c6378e84b6bde317290c16d4f086939448f8fbaa\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ff9e16f0021e9f4d2dcd8aa9e659e0c935ebecc5e21365be768ab1e5839763b1\"" Dec 13 14:23:10.105237 env[1211]: time="2024-12-13T14:23:10.105217055Z" level=info msg="StartContainer for \"ff9e16f0021e9f4d2dcd8aa9e659e0c935ebecc5e21365be768ab1e5839763b1\"" Dec 13 14:23:10.109458 systemd[1]: Started cri-containerd-40ec0789c3cb2e69e7da7e14ef49c11d686aaa3bfb5acdd8f231e4ad0945d050.scope. Dec 13 14:23:10.115588 systemd[1]: Started cri-containerd-26e81a57b156e2308394ed578e5afc3146c86080c1fd242b2a60ef2ca8b01e4d.scope. Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.123000 audit: BPF prog-id=73 op=LOAD Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1758 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656330373839633363623265363965376461376531346566343963 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1758 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656330373839633363623265363965376461376531346566343963 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.124000 audit: BPF prog-id=74 op=LOAD Dec 13 14:23:10.126616 systemd[1]: Started cri-containerd-ff9e16f0021e9f4d2dcd8aa9e659e0c935ebecc5e21365be768ab1e5839763b1.scope. Dec 13 14:23:10.124000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002211e0 items=0 ppid=1758 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656330373839633363623265363965376461376531346566343963 Dec 13 14:23:10.125000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.125000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.125000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.125000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.125000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.125000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.125000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.125000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.125000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.125000 audit: BPF prog-id=75 op=LOAD Dec 13 14:23:10.125000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221228 items=0 ppid=1758 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656330373839633363623265363965376461376531346566343963 Dec 13 14:23:10.126000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:23:10.126000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.126000 audit: BPF prog-id=76 op=LOAD Dec 13 14:23:10.126000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221638 items=0 ppid=1758 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.127000 audit: BPF prog-id=77 op=LOAD Dec 13 14:23:10.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430656330373839633363623265363965376461376531346566343963 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1786 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653831613537623135366532333038333934656435373865356166 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1786 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653831613537623135366532333038333934656435373865356166 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit: BPF prog-id=78 op=LOAD Dec 13 14:23:10.128000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000fbdc0 items=0 ppid=1786 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653831613537623135366532333038333934656435373865356166 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit: BPF prog-id=79 op=LOAD Dec 13 14:23:10.128000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000fbe08 items=0 ppid=1786 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653831613537623135366532333038333934656435373865356166 Dec 13 14:23:10.128000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:23:10.128000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.128000 audit: BPF prog-id=80 op=LOAD Dec 13 14:23:10.128000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d8218 items=0 ppid=1786 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653831613537623135366532333038333934656435373865356166 Dec 13 14:23:10.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit: BPF prog-id=81 op=LOAD Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1784 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666396531366630303231653966346432646364386161396536353965 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1784 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666396531366630303231653966346432646364386161396536353965 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit: BPF prog-id=82 op=LOAD Dec 13 14:23:10.138000 audit[1923]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a3c90 items=0 ppid=1784 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666396531366630303231653966346432646364386161396536353965 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit: BPF prog-id=83 op=LOAD Dec 13 14:23:10.138000 audit[1923]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a3cd8 items=0 ppid=1784 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666396531366630303231653966346432646364386161396536353965 Dec 13 14:23:10.138000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:23:10.138000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:10.138000 audit: BPF prog-id=84 op=LOAD Dec 13 14:23:10.138000 audit[1923]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002fc0e8 items=0 ppid=1784 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666396531366630303231653966346432646364386161396536353965 Dec 13 14:23:10.158294 env[1211]: time="2024-12-13T14:23:10.158236956Z" level=info msg="StartContainer for \"26e81a57b156e2308394ed578e5afc3146c86080c1fd242b2a60ef2ca8b01e4d\" returns successfully" Dec 13 14:23:10.159807 env[1211]: time="2024-12-13T14:23:10.159781773Z" level=info msg="StartContainer for \"40ec0789c3cb2e69e7da7e14ef49c11d686aaa3bfb5acdd8f231e4ad0945d050\" returns successfully" Dec 13 14:23:10.179476 env[1211]: time="2024-12-13T14:23:10.179423268Z" level=info msg="StartContainer for \"ff9e16f0021e9f4d2dcd8aa9e659e0c935ebecc5e21365be768ab1e5839763b1\" returns successfully" Dec 13 14:23:10.341997 kubelet[1716]: E1213 14:23:10.341964 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:10.348725 kubelet[1716]: E1213 14:23:10.348569 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:10.350651 kubelet[1716]: E1213 14:23:10.350571 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:11.343000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:11.343000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00039a0c0 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:11.343000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:11.344000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:11.344000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ba4a00 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:11.344000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:11.377373 kubelet[1716]: E1213 14:23:11.377324 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:11.436808 kubelet[1716]: I1213 14:23:11.436768 1716 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:23:11.590000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:11.590000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:11.590000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0058daa80 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:23:11.590000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:11.590000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c005514fc0 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:23:11.590000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:11.590000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:11.590000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0056175c0 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:23:11.590000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:11.592000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:11.592000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c00654e810 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:23:11.592000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:11.593000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:11.593000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0055150e0 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:23:11.593000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:11.593000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:11.593000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00654eb70 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:23:11.593000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:23:11.621505 kubelet[1716]: E1213 14:23:11.621443 1716 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 14:23:11.719833 kubelet[1716]: I1213 14:23:11.719781 1716 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:23:11.736366 kubelet[1716]: E1213 14:23:11.736284 1716 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:23:11.837458 kubelet[1716]: E1213 14:23:11.837412 1716 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:23:11.938145 kubelet[1716]: E1213 14:23:11.938000 1716 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:23:12.038611 kubelet[1716]: E1213 14:23:12.038559 1716 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:23:12.139609 kubelet[1716]: E1213 14:23:12.139559 1716 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:23:12.240578 kubelet[1716]: E1213 14:23:12.240396 1716 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:23:13.283515 kubelet[1716]: I1213 14:23:13.283471 1716 apiserver.go:52] "Watching apiserver" Dec 13 14:23:13.308865 kubelet[1716]: I1213 14:23:13.308813 1716 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:23:13.925366 kernel: kauditd_printk_skb: 581 callbacks suppressed Dec 13 14:23:13.925503 kernel: audit: type=1400 audit(1734099793.923:561): avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:13.923000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:13.924000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:13.932949 kernel: audit: type=1400 audit(1734099793.924:562): avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:13.933189 kernel: audit: type=1300 audit(1734099793.924:562): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a33620 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:13.924000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a33620 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:13.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:13.942373 kernel: audit: type=1327 audit(1734099793.924:562): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:13.942432 kernel: audit: type=1400 audit(1734099793.924:563): avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:13.924000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:13.924000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00087a800 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:13.952037 kernel: audit: type=1300 audit(1734099793.924:563): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00087a800 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:13.952187 kernel: audit: type=1327 audit(1734099793.924:563): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:13.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:13.924000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:13.961165 kernel: audit: type=1400 audit(1734099793.924:564): avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:13.961308 kernel: audit: type=1300 audit(1734099793.924:564): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009ec8c0 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:13.924000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009ec8c0 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:13.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:13.970802 kernel: audit: type=1327 audit(1734099793.924:564): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:13.923000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a33500 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:13.923000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:14.339689 kubelet[1716]: E1213 14:23:14.339651 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:14.381117 kubelet[1716]: E1213 14:23:14.381080 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:14.437321 systemd[1]: Reloading. Dec 13 14:23:14.573661 /usr/lib/systemd/system-generators/torcx-generator[2018]: time="2024-12-13T14:23:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:23:14.573696 /usr/lib/systemd/system-generators/torcx-generator[2018]: time="2024-12-13T14:23:14Z" level=info msg="torcx already run" Dec 13 14:23:14.635078 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:23:14.635098 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:23:14.652801 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:23:14.694488 kubelet[1716]: E1213 14:23:14.694442 1716 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.748000 audit: BPF prog-id=85 op=LOAD Dec 13 14:23:14.748000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:23:14.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit: BPF prog-id=86 op=LOAD Dec 13 14:23:14.750000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit: BPF prog-id=87 op=LOAD Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.750000 audit: BPF prog-id=88 op=LOAD Dec 13 14:23:14.750000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:23:14.750000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.751000 audit: BPF prog-id=89 op=LOAD Dec 13 14:23:14.751000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.752000 audit: BPF prog-id=90 op=LOAD Dec 13 14:23:14.752000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.753000 audit: BPF prog-id=91 op=LOAD Dec 13 14:23:14.753000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.755000 audit: BPF prog-id=92 op=LOAD Dec 13 14:23:14.755000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:23:14.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit: BPF prog-id=93 op=LOAD Dec 13 14:23:14.758000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.758000 audit: BPF prog-id=94 op=LOAD Dec 13 14:23:14.758000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.759000 audit: BPF prog-id=95 op=LOAD Dec 13 14:23:14.759000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit: BPF prog-id=96 op=LOAD Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit: BPF prog-id=97 op=LOAD Dec 13 14:23:14.760000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:23:14.760000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit: BPF prog-id=98 op=LOAD Dec 13 14:23:14.761000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit: BPF prog-id=99 op=LOAD Dec 13 14:23:14.762000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit: BPF prog-id=100 op=LOAD Dec 13 14:23:14.763000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit: BPF prog-id=101 op=LOAD Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.763000 audit: BPF prog-id=102 op=LOAD Dec 13 14:23:14.763000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:23:14.763000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit: BPF prog-id=103 op=LOAD Dec 13 14:23:14.764000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit: BPF prog-id=104 op=LOAD Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.765000 audit: BPF prog-id=105 op=LOAD Dec 13 14:23:14.765000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:23:14.765000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:23:14.778221 kubelet[1716]: I1213 14:23:14.778193 1716 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:23:14.778400 systemd[1]: Stopping kubelet.service... Dec 13 14:23:14.804979 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:23:14.805234 systemd[1]: Stopped kubelet.service. Dec 13 14:23:14.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:14.807000 systemd[1]: Starting kubelet.service... Dec 13 14:23:14.886948 systemd[1]: Started kubelet.service. Dec 13 14:23:14.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:14.932097 kubelet[2063]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:23:14.932097 kubelet[2063]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:23:14.932097 kubelet[2063]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:23:14.932513 kubelet[2063]: I1213 14:23:14.932302 2063 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:23:14.936439 kubelet[2063]: I1213 14:23:14.936395 2063 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:23:14.936439 kubelet[2063]: I1213 14:23:14.936421 2063 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:23:14.936636 kubelet[2063]: I1213 14:23:14.936617 2063 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:23:14.937803 kubelet[2063]: I1213 14:23:14.937783 2063 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:23:14.938807 kubelet[2063]: I1213 14:23:14.938785 2063 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:23:14.944345 kubelet[2063]: I1213 14:23:14.944290 2063 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:23:14.944535 kubelet[2063]: I1213 14:23:14.944496 2063 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:23:14.944880 kubelet[2063]: I1213 14:23:14.944719 2063 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:23:14.944968 kubelet[2063]: I1213 14:23:14.944884 2063 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:23:14.944968 kubelet[2063]: I1213 14:23:14.944892 2063 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:23:14.944968 kubelet[2063]: I1213 14:23:14.944926 2063 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:23:14.945050 kubelet[2063]: I1213 14:23:14.945008 2063 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:23:14.945050 kubelet[2063]: I1213 14:23:14.945043 2063 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:23:14.945093 kubelet[2063]: I1213 14:23:14.945061 2063 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:23:14.945093 kubelet[2063]: I1213 14:23:14.945075 2063 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:23:14.945797 kubelet[2063]: I1213 14:23:14.945773 2063 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:23:14.945930 kubelet[2063]: I1213 14:23:14.945911 2063 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:23:14.946266 kubelet[2063]: I1213 14:23:14.946245 2063 server.go:1264] "Started kubelet" Dec 13 14:23:14.946929 kubelet[2063]: I1213 14:23:14.946903 2063 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:23:14.948124 kubelet[2063]: I1213 14:23:14.948101 2063 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:23:14.954000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.954000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:14.954000 audit[2063]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dc7500 a1=c0009d88e8 a2=c000dc74d0 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.954000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:14.954000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:14.954000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:14.954000 audit[2063]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009befc0 a1=c0009d8900 a2=c000dc7590 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.954000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:14.955193 kubelet[2063]: I1213 14:23:14.954660 2063 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:23:14.955193 kubelet[2063]: I1213 14:23:14.954695 2063 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:23:14.955193 kubelet[2063]: I1213 14:23:14.954717 2063 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:23:14.956622 kubelet[2063]: I1213 14:23:14.956603 2063 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:23:14.956965 kubelet[2063]: I1213 14:23:14.956923 2063 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:23:14.957105 kubelet[2063]: I1213 14:23:14.957074 2063 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:23:14.961175 kubelet[2063]: I1213 14:23:14.961084 2063 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:23:14.962004 kubelet[2063]: I1213 14:23:14.961963 2063 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:23:14.964566 kubelet[2063]: I1213 14:23:14.964535 2063 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:23:14.964566 kubelet[2063]: I1213 14:23:14.964556 2063 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:23:14.964731 kubelet[2063]: I1213 14:23:14.964608 2063 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:23:14.966553 kubelet[2063]: E1213 14:23:14.966534 2063 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:23:14.968221 kubelet[2063]: I1213 14:23:14.968190 2063 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:23:14.969060 kubelet[2063]: I1213 14:23:14.969043 2063 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:23:14.969185 kubelet[2063]: I1213 14:23:14.969169 2063 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:23:14.969291 kubelet[2063]: I1213 14:23:14.969263 2063 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:23:14.969463 kubelet[2063]: E1213 14:23:14.969434 2063 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:23:14.996525 kubelet[2063]: I1213 14:23:14.996492 2063 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:23:14.996525 kubelet[2063]: I1213 14:23:14.996513 2063 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:23:14.996525 kubelet[2063]: I1213 14:23:14.996535 2063 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:23:14.996735 kubelet[2063]: I1213 14:23:14.996719 2063 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:23:14.996758 kubelet[2063]: I1213 14:23:14.996730 2063 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:23:14.996758 kubelet[2063]: I1213 14:23:14.996751 2063 policy_none.go:49] "None policy: Start" Dec 13 14:23:14.997434 kubelet[2063]: I1213 14:23:14.997414 2063 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:23:14.997501 kubelet[2063]: I1213 14:23:14.997439 2063 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:23:14.997643 kubelet[2063]: I1213 14:23:14.997615 2063 state_mem.go:75] "Updated machine memory state" Dec 13 14:23:15.001878 kubelet[2063]: I1213 14:23:15.001858 2063 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:23:15.001000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:15.001000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:15.001000 audit[2063]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0012374a0 a1=c000905380 a2=c001237470 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:15.001000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:15.002829 kubelet[2063]: I1213 14:23:15.001990 2063 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:23:15.002829 kubelet[2063]: I1213 14:23:15.002134 2063 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:23:15.002829 kubelet[2063]: I1213 14:23:15.002241 2063 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:23:15.060653 kubelet[2063]: I1213 14:23:15.060624 2063 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:23:15.066892 kubelet[2063]: I1213 14:23:15.066864 2063 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 14:23:15.067046 kubelet[2063]: I1213 14:23:15.066949 2063 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:23:15.069650 kubelet[2063]: I1213 14:23:15.069617 2063 topology_manager.go:215] "Topology Admit Handler" podUID="dc8854ce37bf7cfab78404e2d26defb1" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:23:15.069740 kubelet[2063]: I1213 14:23:15.069728 2063 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:23:15.069792 kubelet[2063]: I1213 14:23:15.069770 2063 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:23:15.077347 kubelet[2063]: E1213 14:23:15.077295 2063 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:15.077472 kubelet[2063]: E1213 14:23:15.077432 2063 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 14:23:15.258918 kubelet[2063]: I1213 14:23:15.258775 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:15.258918 kubelet[2063]: I1213 14:23:15.258811 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:15.258918 kubelet[2063]: I1213 14:23:15.258833 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:15.258918 kubelet[2063]: I1213 14:23:15.258851 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:23:15.258918 kubelet[2063]: I1213 14:23:15.258866 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dc8854ce37bf7cfab78404e2d26defb1-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"dc8854ce37bf7cfab78404e2d26defb1\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:23:15.259222 kubelet[2063]: I1213 14:23:15.258878 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dc8854ce37bf7cfab78404e2d26defb1-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"dc8854ce37bf7cfab78404e2d26defb1\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:23:15.259222 kubelet[2063]: I1213 14:23:15.258890 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dc8854ce37bf7cfab78404e2d26defb1-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"dc8854ce37bf7cfab78404e2d26defb1\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:23:15.259222 kubelet[2063]: I1213 14:23:15.258922 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:15.259222 kubelet[2063]: I1213 14:23:15.258940 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:15.378892 kubelet[2063]: E1213 14:23:15.378854 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:15.379080 kubelet[2063]: E1213 14:23:15.379036 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:15.379080 kubelet[2063]: E1213 14:23:15.378937 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:15.945306 kubelet[2063]: I1213 14:23:15.945238 2063 apiserver.go:52] "Watching apiserver" Dec 13 14:23:15.957859 kubelet[2063]: I1213 14:23:15.957821 2063 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:23:15.983063 kubelet[2063]: E1213 14:23:15.983021 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:15.983063 kubelet[2063]: E1213 14:23:15.983065 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:15.989479 kubelet[2063]: E1213 14:23:15.989439 2063 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Dec 13 14:23:15.989921 kubelet[2063]: E1213 14:23:15.989899 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:16.023032 kubelet[2063]: I1213 14:23:16.022932 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.022908634 podStartE2EDuration="1.022908634s" podCreationTimestamp="2024-12-13 14:23:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:16.012834724 +0000 UTC m=+1.119833345" watchObservedRunningTime="2024-12-13 14:23:16.022908634 +0000 UTC m=+1.129907245" Dec 13 14:23:16.035770 kubelet[2063]: I1213 14:23:16.035686 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.035640878 podStartE2EDuration="2.035640878s" podCreationTimestamp="2024-12-13 14:23:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:16.023171274 +0000 UTC m=+1.130169885" watchObservedRunningTime="2024-12-13 14:23:16.035640878 +0000 UTC m=+1.142639499" Dec 13 14:23:16.047537 kubelet[2063]: I1213 14:23:16.047450 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.047431628 podStartE2EDuration="2.047431628s" podCreationTimestamp="2024-12-13 14:23:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:16.036943089 +0000 UTC m=+1.143941700" watchObservedRunningTime="2024-12-13 14:23:16.047431628 +0000 UTC m=+1.154430239" Dec 13 14:23:16.985035 kubelet[2063]: E1213 14:23:16.984950 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:16.985503 kubelet[2063]: E1213 14:23:16.985363 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:17.809217 kubelet[2063]: E1213 14:23:17.809156 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:17.986125 kubelet[2063]: E1213 14:23:17.986082 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:19.430276 kubelet[2063]: E1213 14:23:19.430221 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:19.968035 sudo[1349]: pam_unix(sudo:session): session closed for user root Dec 13 14:23:19.967000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:19.969099 kernel: kauditd_printk_skb: 260 callbacks suppressed Dec 13 14:23:19.969247 kernel: audit: type=1106 audit(1734099799.967:814): pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:19.970082 sshd[1345]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:19.967000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:19.972555 systemd[1]: sshd@6-10.0.0.64:22-10.0.0.1:40188.service: Deactivated successfully. Dec 13 14:23:19.973205 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:23:19.973354 systemd[1]: session-7.scope: Consumed 3.960s CPU time. Dec 13 14:23:19.973800 systemd-logind[1198]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:23:19.974615 systemd-logind[1198]: Removed session 7. Dec 13 14:23:19.977061 kernel: audit: type=1104 audit(1734099799.967:815): pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:19.977115 kernel: audit: type=1106 audit(1734099799.970:816): pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:19.970000 audit[1345]: USER_END pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:19.970000 audit[1345]: CRED_DISP pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:19.985027 kernel: audit: type=1104 audit(1734099799.970:817): pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:19.985065 kernel: audit: type=1131 audit(1734099799.972:818): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.64:22-10.0.0.1:40188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:19.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.64:22-10.0.0.1:40188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:25.322657 update_engine[1203]: I1213 14:23:25.322598 1203 update_attempter.cc:509] Updating boot flags... Dec 13 14:23:26.333205 kubelet[2063]: E1213 14:23:26.333159 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:27.001490 kubelet[2063]: E1213 14:23:27.001439 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:27.808000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:23:27.813773 kubelet[2063]: E1213 14:23:27.813735 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:27.808000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f79700 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:27.907484 kernel: audit: type=1400 audit(1734099807.808:819): avc: denied { watch } for pid=1941 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:23:27.907661 kernel: audit: type=1300 audit(1734099807.808:819): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f79700 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:23:27.907684 kernel: audit: type=1327 audit(1734099807.808:819): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:27.808000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:28.673395 kubelet[2063]: I1213 14:23:28.673348 2063 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:23:28.673876 env[1211]: time="2024-12-13T14:23:28.673758452Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:23:28.674248 kubelet[2063]: I1213 14:23:28.674097 2063 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:23:28.787944 kubelet[2063]: I1213 14:23:28.787897 2063 topology_manager.go:215] "Topology Admit Handler" podUID="0dd81344-a0ab-4641-9e45-4fd8207389a9" podNamespace="kube-system" podName="kube-proxy-zkm45" Dec 13 14:23:28.794604 systemd[1]: Created slice kubepods-besteffort-pod0dd81344_a0ab_4641_9e45_4fd8207389a9.slice. Dec 13 14:23:28.854057 kubelet[2063]: I1213 14:23:28.854013 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0dd81344-a0ab-4641-9e45-4fd8207389a9-xtables-lock\") pod \"kube-proxy-zkm45\" (UID: \"0dd81344-a0ab-4641-9e45-4fd8207389a9\") " pod="kube-system/kube-proxy-zkm45" Dec 13 14:23:28.854693 kubelet[2063]: I1213 14:23:28.854669 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0dd81344-a0ab-4641-9e45-4fd8207389a9-kube-proxy\") pod \"kube-proxy-zkm45\" (UID: \"0dd81344-a0ab-4641-9e45-4fd8207389a9\") " pod="kube-system/kube-proxy-zkm45" Dec 13 14:23:28.854767 kubelet[2063]: I1213 14:23:28.854703 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0dd81344-a0ab-4641-9e45-4fd8207389a9-lib-modules\") pod \"kube-proxy-zkm45\" (UID: \"0dd81344-a0ab-4641-9e45-4fd8207389a9\") " pod="kube-system/kube-proxy-zkm45" Dec 13 14:23:28.854767 kubelet[2063]: I1213 14:23:28.854740 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xncp7\" (UniqueName: \"kubernetes.io/projected/0dd81344-a0ab-4641-9e45-4fd8207389a9-kube-api-access-xncp7\") pod \"kube-proxy-zkm45\" (UID: \"0dd81344-a0ab-4641-9e45-4fd8207389a9\") " pod="kube-system/kube-proxy-zkm45" Dec 13 14:23:28.859998 kubelet[2063]: I1213 14:23:28.859777 2063 topology_manager.go:215] "Topology Admit Handler" podUID="ec3dd0d0-3ff2-4a63-9fec-123edc8d9832" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-27gqs" Dec 13 14:23:28.867114 systemd[1]: Created slice kubepods-besteffort-podec3dd0d0_3ff2_4a63_9fec_123edc8d9832.slice. Dec 13 14:23:28.955802 kubelet[2063]: I1213 14:23:28.955667 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w6466\" (UniqueName: \"kubernetes.io/projected/ec3dd0d0-3ff2-4a63-9fec-123edc8d9832-kube-api-access-w6466\") pod \"tigera-operator-7bc55997bb-27gqs\" (UID: \"ec3dd0d0-3ff2-4a63-9fec-123edc8d9832\") " pod="tigera-operator/tigera-operator-7bc55997bb-27gqs" Dec 13 14:23:28.955802 kubelet[2063]: I1213 14:23:28.955745 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ec3dd0d0-3ff2-4a63-9fec-123edc8d9832-var-lib-calico\") pod \"tigera-operator-7bc55997bb-27gqs\" (UID: \"ec3dd0d0-3ff2-4a63-9fec-123edc8d9832\") " pod="tigera-operator/tigera-operator-7bc55997bb-27gqs" Dec 13 14:23:29.104379 kubelet[2063]: E1213 14:23:29.104353 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:29.104857 env[1211]: time="2024-12-13T14:23:29.104785044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zkm45,Uid:0dd81344-a0ab-4641-9e45-4fd8207389a9,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:29.172033 env[1211]: time="2024-12-13T14:23:29.171957294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-27gqs,Uid:ec3dd0d0-3ff2-4a63-9fec-123edc8d9832,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:23:29.434926 kubelet[2063]: E1213 14:23:29.434891 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:29.799229 env[1211]: time="2024-12-13T14:23:29.798967278Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:29.799229 env[1211]: time="2024-12-13T14:23:29.799007333Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:29.799229 env[1211]: time="2024-12-13T14:23:29.799021350Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:29.799229 env[1211]: time="2024-12-13T14:23:29.799158659Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95c1d9a3d902ee5007e94d3df0ce8bd6db0cf96f3ccd11416e3219c878b0ba55 pid=2177 runtime=io.containerd.runc.v2 Dec 13 14:23:29.813202 env[1211]: time="2024-12-13T14:23:29.813125300Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:29.813386 env[1211]: time="2024-12-13T14:23:29.813206313Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:29.813386 env[1211]: time="2024-12-13T14:23:29.813243483Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:29.813529 env[1211]: time="2024-12-13T14:23:29.813497673Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0100ed427abe9a60f398d71dfd6b0ed26c4c5a02595c0d74c742d664503a455 pid=2201 runtime=io.containerd.runc.v2 Dec 13 14:23:29.814244 systemd[1]: Started cri-containerd-95c1d9a3d902ee5007e94d3df0ce8bd6db0cf96f3ccd11416e3219c878b0ba55.scope. Dec 13 14:23:29.825635 systemd[1]: Started cri-containerd-e0100ed427abe9a60f398d71dfd6b0ed26c4c5a02595c0d74c742d664503a455.scope. Dec 13 14:23:29.842136 kernel: audit: type=1400 audit(1734099809.826:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.842263 kernel: audit: type=1400 audit(1734099809.826:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.842317 kernel: audit: type=1400 audit(1734099809.826:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.842417 kernel: audit: type=1400 audit(1734099809.826:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit: BPF prog-id=106 op=LOAD Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2177 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633164396133643930326565353030376539346433646630636538 Dec 13 14:23:29.846357 kernel: audit: type=1400 audit(1734099809.826:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.846399 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:23:29.846427 kernel: audit: type=1400 audit(1734099809.826:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2177 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633164396133643930326565353030376539346433646630636538 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit: BPF prog-id=107 op=LOAD Dec 13 14:23:29.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.834000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025690 items=0 ppid=2177 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.841000 audit: BPF prog-id=108 op=LOAD Dec 13 14:23:29.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633164396133643930326565353030376539346433646630636538 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit: BPF prog-id=109 op=LOAD Dec 13 14:23:29.841000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000256d8 items=0 ppid=2177 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633164396133643930326565353030376539346433646630636538 Dec 13 14:23:29.841000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:23:29.841000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.841000 audit: BPF prog-id=110 op=LOAD Dec 13 14:23:29.841000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025ae8 items=0 ppid=2177 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633164396133643930326565353030376539346433646630636538 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2201 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313030656434323761626539613630663339386437316466643662 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.848000 audit: BPF prog-id=111 op=LOAD Dec 13 14:23:29.848000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024fe0 items=0 ppid=2201 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313030656434323761626539613630663339386437316466643662 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit: BPF prog-id=112 op=LOAD Dec 13 14:23:29.849000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025028 items=0 ppid=2201 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313030656434323761626539613630663339386437316466643662 Dec 13 14:23:29.849000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:23:29.849000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:29.849000 audit: BPF prog-id=113 op=LOAD Dec 13 14:23:29.849000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025438 items=0 ppid=2201 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313030656434323761626539613630663339386437316466643662 Dec 13 14:23:29.863473 env[1211]: time="2024-12-13T14:23:29.863426315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zkm45,Uid:0dd81344-a0ab-4641-9e45-4fd8207389a9,Namespace:kube-system,Attempt:0,} returns sandbox id \"95c1d9a3d902ee5007e94d3df0ce8bd6db0cf96f3ccd11416e3219c878b0ba55\"" Dec 13 14:23:29.864064 kubelet[2063]: E1213 14:23:29.864033 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:29.866195 env[1211]: time="2024-12-13T14:23:29.866158282Z" level=info msg="CreateContainer within sandbox \"95c1d9a3d902ee5007e94d3df0ce8bd6db0cf96f3ccd11416e3219c878b0ba55\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:23:29.874892 env[1211]: time="2024-12-13T14:23:29.874843873Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-27gqs,Uid:ec3dd0d0-3ff2-4a63-9fec-123edc8d9832,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e0100ed427abe9a60f398d71dfd6b0ed26c4c5a02595c0d74c742d664503a455\"" Dec 13 14:23:29.876412 env[1211]: time="2024-12-13T14:23:29.876382627Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:23:30.169360 env[1211]: time="2024-12-13T14:23:30.169274611Z" level=info msg="CreateContainer within sandbox \"95c1d9a3d902ee5007e94d3df0ce8bd6db0cf96f3ccd11416e3219c878b0ba55\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a665da5baf16bdce4ef256e84a5dc195c7ea03366a74b8d5dac261fecf96809b\"" Dec 13 14:23:30.170210 env[1211]: time="2024-12-13T14:23:30.170155943Z" level=info msg="StartContainer for \"a665da5baf16bdce4ef256e84a5dc195c7ea03366a74b8d5dac261fecf96809b\"" Dec 13 14:23:30.189766 systemd[1]: Started cri-containerd-a665da5baf16bdce4ef256e84a5dc195c7ea03366a74b8d5dac261fecf96809b.scope. Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb83d67e628 items=0 ppid=2177 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363564613562616631366264636534656632353665383461356463 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit: BPF prog-id=114 op=LOAD Dec 13 14:23:30.200000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000edeb8 items=0 ppid=2177 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363564613562616631366264636534656632353665383461356463 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.200000 audit: BPF prog-id=115 op=LOAD Dec 13 14:23:30.200000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000edf08 items=0 ppid=2177 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363564613562616631366264636534656632353665383461356463 Dec 13 14:23:30.201000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:23:30.201000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { perfmon } for pid=2258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit[2258]: AVC avc: denied { bpf } for pid=2258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:30.201000 audit: BPF prog-id=116 op=LOAD Dec 13 14:23:30.201000 audit[2258]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000edf98 items=0 ppid=2177 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363564613562616631366264636534656632353665383461356463 Dec 13 14:23:30.271000 audit[2310]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.271000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7bada890 a2=0 a3=7ffe7bada87c items=0 ppid=2268 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:23:30.272000 audit[2311]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.272000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff607d94d0 a2=0 a3=7fff607d94bc items=0 ppid=2268 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:23:30.273000 audit[2314]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.273000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd42d8eea0 a2=0 a3=7ffd42d8ee8c items=0 ppid=2268 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:23:30.273000 audit[2315]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.273000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd94d46810 a2=0 a3=7ffd94d467fc items=0 ppid=2268 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:23:30.275000 audit[2317]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.275000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6a6ac800 a2=0 a3=7fff6a6ac7ec items=0 ppid=2268 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:23:30.275000 audit[2316]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.275000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff05d571e0 a2=0 a3=7fff05d571cc items=0 ppid=2268 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:23:30.277563 env[1211]: time="2024-12-13T14:23:30.277518332Z" level=info msg="StartContainer for \"a665da5baf16bdce4ef256e84a5dc195c7ea03366a74b8d5dac261fecf96809b\" returns successfully" Dec 13 14:23:30.374000 audit[2318]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.374000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffaa73aa10 a2=0 a3=7fffaa73a9fc items=0 ppid=2268 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:23:30.377000 audit[2320]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.377000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffea3a324e0 a2=0 a3=7ffea3a324cc items=0 ppid=2268 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:23:30.380000 audit[2323]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.380000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc2f2feb20 a2=0 a3=7ffc2f2feb0c items=0 ppid=2268 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:23:30.381000 audit[2324]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.381000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe0280c90 a2=0 a3=7fffe0280c7c items=0 ppid=2268 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:23:30.382000 audit[2326]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.382000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef47aa1c0 a2=0 a3=7ffef47aa1ac items=0 ppid=2268 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:23:30.383000 audit[2327]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.383000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdca2e73d0 a2=0 a3=7ffdca2e73bc items=0 ppid=2268 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:23:30.385000 audit[2329]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.385000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd50ccb740 a2=0 a3=7ffd50ccb72c items=0 ppid=2268 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:23:30.388000 audit[2332]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.388000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeed153910 a2=0 a3=7ffeed1538fc items=0 ppid=2268 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:23:30.389000 audit[2333]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.389000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9ad04c90 a2=0 a3=7ffc9ad04c7c items=0 ppid=2268 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:23:30.391000 audit[2335]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.391000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe716b9cb0 a2=0 a3=7ffe716b9c9c items=0 ppid=2268 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:23:30.392000 audit[2336]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.392000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf0c89280 a2=0 a3=7ffdf0c8926c items=0 ppid=2268 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:23:30.395000 audit[2338]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.395000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdda9cd990 a2=0 a3=7ffdda9cd97c items=0 ppid=2268 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:23:30.397000 audit[2341]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.397000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe54090880 a2=0 a3=7ffe5409086c items=0 ppid=2268 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:23:30.400000 audit[2344]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.400000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd5c2cba40 a2=0 a3=7ffd5c2cba2c items=0 ppid=2268 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:23:30.401000 audit[2345]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.401000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc8f91eb90 a2=0 a3=7ffc8f91eb7c items=0 ppid=2268 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:23:30.403000 audit[2347]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.403000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcfc02dd40 a2=0 a3=7ffcfc02dd2c items=0 ppid=2268 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:30.406000 audit[2350]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.406000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffed9091f0 a2=0 a3=7fffed9091dc items=0 ppid=2268 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:30.407000 audit[2351]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.407000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe514c5050 a2=0 a3=7ffe514c503c items=0 ppid=2268 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:23:30.409000 audit[2353]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:30.409000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe5b6e2c90 a2=0 a3=7ffe5b6e2c7c items=0 ppid=2268 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:23:30.428000 audit[2359]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:30.428000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd715f13e0 a2=0 a3=7ffd715f13cc items=0 ppid=2268 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:30.436000 audit[2359]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:30.436000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd715f13e0 a2=0 a3=7ffd715f13cc items=0 ppid=2268 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:30.437000 audit[2365]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.437000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe0c79dd60 a2=0 a3=7ffe0c79dd4c items=0 ppid=2268 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:23:30.440000 audit[2367]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.440000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe5c169220 a2=0 a3=7ffe5c16920c items=0 ppid=2268 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:23:30.443000 audit[2370]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.443000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffce13814b0 a2=0 a3=7ffce138149c items=0 ppid=2268 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:23:30.444000 audit[2371]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.444000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd774a9390 a2=0 a3=7ffd774a937c items=0 ppid=2268 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:23:30.446000 audit[2373]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.446000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbad13e00 a2=0 a3=7ffdbad13dec items=0 ppid=2268 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:23:30.446000 audit[2374]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.446000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd75bcfaa0 a2=0 a3=7ffd75bcfa8c items=0 ppid=2268 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:23:30.448000 audit[2376]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.448000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffdb34c170 a2=0 a3=7fffdb34c15c items=0 ppid=2268 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:23:30.451000 audit[2379]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.451000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc933ca1c0 a2=0 a3=7ffc933ca1ac items=0 ppid=2268 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:23:30.452000 audit[2380]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.452000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd250f5340 a2=0 a3=7ffd250f532c items=0 ppid=2268 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:23:30.453000 audit[2382]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.453000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb546f2c0 a2=0 a3=7ffcb546f2ac items=0 ppid=2268 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:23:30.454000 audit[2383]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.454000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeafae7d40 a2=0 a3=7ffeafae7d2c items=0 ppid=2268 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:23:30.456000 audit[2385]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.456000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc38e1cd60 a2=0 a3=7ffc38e1cd4c items=0 ppid=2268 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:23:30.459000 audit[2388]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.459000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6f0e5de0 a2=0 a3=7ffc6f0e5dcc items=0 ppid=2268 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:23:30.462000 audit[2391]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.462000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef185a190 a2=0 a3=7ffef185a17c items=0 ppid=2268 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:23:30.463000 audit[2392]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.463000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed77978c0 a2=0 a3=7ffed77978ac items=0 ppid=2268 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:23:30.465000 audit[2394]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.465000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe6d6b3220 a2=0 a3=7ffe6d6b320c items=0 ppid=2268 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:30.467000 audit[2397]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.467000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcb93c87c0 a2=0 a3=7ffcb93c87ac items=0 ppid=2268 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:30.468000 audit[2398]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.468000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4ae7ea20 a2=0 a3=7fff4ae7ea0c items=0 ppid=2268 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.468000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:23:30.470000 audit[2400]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.470000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcc54164e0 a2=0 a3=7ffcc54164cc items=0 ppid=2268 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:23:30.471000 audit[2401]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.471000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff95b4ae20 a2=0 a3=7fff95b4ae0c items=0 ppid=2268 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:23:30.474000 audit[2403]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.474000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2310efc0 a2=0 a3=7ffd2310efac items=0 ppid=2268 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:30.477000 audit[2406]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:30.477000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9492b0b0 a2=0 a3=7fff9492b09c items=0 ppid=2268 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.477000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:30.479000 audit[2408]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:23:30.479000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff3b9ebf20 a2=0 a3=7fff3b9ebf0c items=0 ppid=2268 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.479000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:30.480000 audit[2408]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:23:30.480000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff3b9ebf20 a2=0 a3=7fff3b9ebf0c items=0 ppid=2268 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:30.480000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:30.965435 systemd[1]: run-containerd-runc-k8s.io-a665da5baf16bdce4ef256e84a5dc195c7ea03366a74b8d5dac261fecf96809b-runc.J0eKIC.mount: Deactivated successfully. Dec 13 14:23:31.010638 kubelet[2063]: E1213 14:23:31.010283 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:31.049576 kubelet[2063]: I1213 14:23:31.049295 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-zkm45" podStartSLOduration=3.049268491 podStartE2EDuration="3.049268491s" podCreationTimestamp="2024-12-13 14:23:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:31.049138998 +0000 UTC m=+16.156137639" watchObservedRunningTime="2024-12-13 14:23:31.049268491 +0000 UTC m=+16.156267103" Dec 13 14:23:32.012211 kubelet[2063]: E1213 14:23:32.012164 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:33.463536 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount302265849.mount: Deactivated successfully. Dec 13 14:23:34.169410 env[1211]: time="2024-12-13T14:23:34.169352509Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:34.171391 env[1211]: time="2024-12-13T14:23:34.171366574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:34.173053 env[1211]: time="2024-12-13T14:23:34.173018108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:34.174614 env[1211]: time="2024-12-13T14:23:34.174575673Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:34.174965 env[1211]: time="2024-12-13T14:23:34.174930060Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:23:34.177092 env[1211]: time="2024-12-13T14:23:34.177053182Z" level=info msg="CreateContainer within sandbox \"e0100ed427abe9a60f398d71dfd6b0ed26c4c5a02595c0d74c742d664503a455\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:23:34.190361 env[1211]: time="2024-12-13T14:23:34.190171705Z" level=info msg="CreateContainer within sandbox \"e0100ed427abe9a60f398d71dfd6b0ed26c4c5a02595c0d74c742d664503a455\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f5d7186d92a246f4d0d180ad7385844f6fa0c0cf6b8e5fbce8af01aa81738bf7\"" Dec 13 14:23:34.190876 env[1211]: time="2024-12-13T14:23:34.190835877Z" level=info msg="StartContainer for \"f5d7186d92a246f4d0d180ad7385844f6fa0c0cf6b8e5fbce8af01aa81738bf7\"" Dec 13 14:23:34.207179 systemd[1]: Started cri-containerd-f5d7186d92a246f4d0d180ad7385844f6fa0c0cf6b8e5fbce8af01aa81738bf7.scope. Dec 13 14:23:34.225179 kernel: kauditd_printk_skb: 303 callbacks suppressed Dec 13 14:23:34.225567 kernel: audit: type=1400 audit(1734099814.219:912): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.225617 kernel: audit: type=1400 audit(1734099814.219:913): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.232393 kernel: audit: type=1400 audit(1734099814.219:914): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.232435 kernel: audit: type=1400 audit(1734099814.219:915): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.235954 kernel: audit: type=1400 audit(1734099814.219:916): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.242200 kernel: audit: type=1400 audit(1734099814.219:917): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.242290 kernel: audit: type=1400 audit(1734099814.219:918): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.245438 kernel: audit: type=1400 audit(1734099814.219:919): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.251348 kernel: audit: type=1400 audit(1734099814.219:920): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.251549 kernel: audit: type=1400 audit(1734099814.219:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.219000 audit: BPF prog-id=117 op=LOAD Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2201 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:34.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643731383664393261323436663464306431383061643733383538 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2201 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:34.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643731383664393261323436663464306431383061643733383538 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.224000 audit: BPF prog-id=118 op=LOAD Dec 13 14:23:34.224000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002ab930 items=0 ppid=2201 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:34.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643731383664393261323436663464306431383061643733383538 Dec 13 14:23:34.231000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.231000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.231000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.231000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.231000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.231000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.231000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.231000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.231000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.231000 audit: BPF prog-id=119 op=LOAD Dec 13 14:23:34.231000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002ab978 items=0 ppid=2201 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:34.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643731383664393261323436663464306431383061643733383538 Dec 13 14:23:34.238000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:23:34.238000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.238000 audit: BPF prog-id=120 op=LOAD Dec 13 14:23:34.238000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002abd88 items=0 ppid=2201 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:34.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643731383664393261323436663464306431383061643733383538 Dec 13 14:23:34.284573 env[1211]: time="2024-12-13T14:23:34.284495137Z" level=info msg="StartContainer for \"f5d7186d92a246f4d0d180ad7385844f6fa0c0cf6b8e5fbce8af01aa81738bf7\" returns successfully" Dec 13 14:23:37.523000 audit[2449]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:37.523000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcd99e7380 a2=0 a3=7ffcd99e736c items=0 ppid=2268 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:37.527000 audit[2449]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:37.527000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcd99e7380 a2=0 a3=0 items=0 ppid=2268 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:37.539000 audit[2451]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:37.539000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff23f86b20 a2=0 a3=7fff23f86b0c items=0 ppid=2268 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.539000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:37.548000 audit[2451]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:37.548000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff23f86b20 a2=0 a3=0 items=0 ppid=2268 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:37.901412 kubelet[2063]: I1213 14:23:37.901315 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-27gqs" podStartSLOduration=5.601404056 podStartE2EDuration="9.901292859s" podCreationTimestamp="2024-12-13 14:23:28 +0000 UTC" firstStartedPulling="2024-12-13 14:23:29.875943248 +0000 UTC m=+14.982941849" lastFinishedPulling="2024-12-13 14:23:34.175832031 +0000 UTC m=+19.282830652" observedRunningTime="2024-12-13 14:23:35.043885292 +0000 UTC m=+20.150883903" watchObservedRunningTime="2024-12-13 14:23:37.901292859 +0000 UTC m=+23.008291470" Dec 13 14:23:37.901982 kubelet[2063]: I1213 14:23:37.901475 2063 topology_manager.go:215] "Topology Admit Handler" podUID="14ecb31e-fd64-4ecb-9148-aa6591f2740c" podNamespace="calico-system" podName="calico-typha-765c6ddf54-lqwqw" Dec 13 14:23:37.909624 kubelet[2063]: W1213 14:23:37.906146 2063 reflector.go:547] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 14:23:37.909624 kubelet[2063]: E1213 14:23:37.906205 2063 reflector.go:150] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 14:23:37.908506 systemd[1]: Created slice kubepods-besteffort-pod14ecb31e_fd64_4ecb_9148_aa6591f2740c.slice. Dec 13 14:23:38.017889 kubelet[2063]: I1213 14:23:38.017821 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vdd6j\" (UniqueName: \"kubernetes.io/projected/14ecb31e-fd64-4ecb-9148-aa6591f2740c-kube-api-access-vdd6j\") pod \"calico-typha-765c6ddf54-lqwqw\" (UID: \"14ecb31e-fd64-4ecb-9148-aa6591f2740c\") " pod="calico-system/calico-typha-765c6ddf54-lqwqw" Dec 13 14:23:38.017889 kubelet[2063]: I1213 14:23:38.017887 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/14ecb31e-fd64-4ecb-9148-aa6591f2740c-tigera-ca-bundle\") pod \"calico-typha-765c6ddf54-lqwqw\" (UID: \"14ecb31e-fd64-4ecb-9148-aa6591f2740c\") " pod="calico-system/calico-typha-765c6ddf54-lqwqw" Dec 13 14:23:38.018125 kubelet[2063]: I1213 14:23:38.017906 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/14ecb31e-fd64-4ecb-9148-aa6591f2740c-typha-certs\") pod \"calico-typha-765c6ddf54-lqwqw\" (UID: \"14ecb31e-fd64-4ecb-9148-aa6591f2740c\") " pod="calico-system/calico-typha-765c6ddf54-lqwqw" Dec 13 14:23:38.076905 kubelet[2063]: I1213 14:23:38.076825 2063 topology_manager.go:215] "Topology Admit Handler" podUID="e62532c5-73e6-4679-b98e-e9ad59426d3e" podNamespace="calico-system" podName="calico-node-qfkng" Dec 13 14:23:38.083585 systemd[1]: Created slice kubepods-besteffort-pode62532c5_73e6_4679_b98e_e9ad59426d3e.slice. Dec 13 14:23:38.118463 kubelet[2063]: I1213 14:23:38.118399 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e62532c5-73e6-4679-b98e-e9ad59426d3e-node-certs\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118463 kubelet[2063]: I1213 14:23:38.118457 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e62532c5-73e6-4679-b98e-e9ad59426d3e-cni-net-dir\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118718 kubelet[2063]: I1213 14:23:38.118498 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e62532c5-73e6-4679-b98e-e9ad59426d3e-cni-log-dir\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118718 kubelet[2063]: I1213 14:23:38.118544 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e62532c5-73e6-4679-b98e-e9ad59426d3e-xtables-lock\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118718 kubelet[2063]: I1213 14:23:38.118564 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e62532c5-73e6-4679-b98e-e9ad59426d3e-policysync\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118718 kubelet[2063]: I1213 14:23:38.118582 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e62532c5-73e6-4679-b98e-e9ad59426d3e-cni-bin-dir\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118718 kubelet[2063]: I1213 14:23:38.118599 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e62532c5-73e6-4679-b98e-e9ad59426d3e-flexvol-driver-host\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118863 kubelet[2063]: I1213 14:23:38.118623 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e62532c5-73e6-4679-b98e-e9ad59426d3e-var-lib-calico\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118863 kubelet[2063]: I1213 14:23:38.118649 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e62532c5-73e6-4679-b98e-e9ad59426d3e-lib-modules\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118863 kubelet[2063]: I1213 14:23:38.118670 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e62532c5-73e6-4679-b98e-e9ad59426d3e-tigera-ca-bundle\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118863 kubelet[2063]: I1213 14:23:38.118688 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e62532c5-73e6-4679-b98e-e9ad59426d3e-var-run-calico\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.118863 kubelet[2063]: I1213 14:23:38.118710 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dd7c9\" (UniqueName: \"kubernetes.io/projected/e62532c5-73e6-4679-b98e-e9ad59426d3e-kube-api-access-dd7c9\") pod \"calico-node-qfkng\" (UID: \"e62532c5-73e6-4679-b98e-e9ad59426d3e\") " pod="calico-system/calico-node-qfkng" Dec 13 14:23:38.192715 kubelet[2063]: I1213 14:23:38.192560 2063 topology_manager.go:215] "Topology Admit Handler" podUID="069b8970-9593-418e-89c7-b56afcdca929" podNamespace="calico-system" podName="csi-node-driver-mwrh5" Dec 13 14:23:38.193281 kubelet[2063]: E1213 14:23:38.193253 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:38.219093 kubelet[2063]: I1213 14:23:38.219028 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/069b8970-9593-418e-89c7-b56afcdca929-varrun\") pod \"csi-node-driver-mwrh5\" (UID: \"069b8970-9593-418e-89c7-b56afcdca929\") " pod="calico-system/csi-node-driver-mwrh5" Dec 13 14:23:38.219303 kubelet[2063]: I1213 14:23:38.219173 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/069b8970-9593-418e-89c7-b56afcdca929-registration-dir\") pod \"csi-node-driver-mwrh5\" (UID: \"069b8970-9593-418e-89c7-b56afcdca929\") " pod="calico-system/csi-node-driver-mwrh5" Dec 13 14:23:38.219303 kubelet[2063]: I1213 14:23:38.219242 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/069b8970-9593-418e-89c7-b56afcdca929-kubelet-dir\") pod \"csi-node-driver-mwrh5\" (UID: \"069b8970-9593-418e-89c7-b56afcdca929\") " pod="calico-system/csi-node-driver-mwrh5" Dec 13 14:23:38.219303 kubelet[2063]: I1213 14:23:38.219266 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/069b8970-9593-418e-89c7-b56afcdca929-socket-dir\") pod \"csi-node-driver-mwrh5\" (UID: \"069b8970-9593-418e-89c7-b56afcdca929\") " pod="calico-system/csi-node-driver-mwrh5" Dec 13 14:23:38.219418 kubelet[2063]: I1213 14:23:38.219346 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k4dtr\" (UniqueName: \"kubernetes.io/projected/069b8970-9593-418e-89c7-b56afcdca929-kube-api-access-k4dtr\") pod \"csi-node-driver-mwrh5\" (UID: \"069b8970-9593-418e-89c7-b56afcdca929\") " pod="calico-system/csi-node-driver-mwrh5" Dec 13 14:23:38.220807 kubelet[2063]: E1213 14:23:38.220776 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.220807 kubelet[2063]: W1213 14:23:38.220797 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.220903 kubelet[2063]: E1213 14:23:38.220828 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.226504 kubelet[2063]: E1213 14:23:38.223835 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.226504 kubelet[2063]: W1213 14:23:38.223851 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.226504 kubelet[2063]: E1213 14:23:38.223876 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.227041 kubelet[2063]: E1213 14:23:38.227017 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.227096 kubelet[2063]: W1213 14:23:38.227041 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.227184 kubelet[2063]: E1213 14:23:38.227142 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.227426 kubelet[2063]: E1213 14:23:38.227391 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.227426 kubelet[2063]: W1213 14:23:38.227407 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.227540 kubelet[2063]: E1213 14:23:38.227460 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.227690 kubelet[2063]: E1213 14:23:38.227671 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.227690 kubelet[2063]: W1213 14:23:38.227687 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.227797 kubelet[2063]: E1213 14:23:38.227772 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.228014 kubelet[2063]: E1213 14:23:38.227993 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.228014 kubelet[2063]: W1213 14:23:38.228008 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.228105 kubelet[2063]: E1213 14:23:38.228027 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.228218 kubelet[2063]: E1213 14:23:38.228199 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.228218 kubelet[2063]: W1213 14:23:38.228213 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.228312 kubelet[2063]: E1213 14:23:38.228224 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.228420 kubelet[2063]: E1213 14:23:38.228402 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.228420 kubelet[2063]: W1213 14:23:38.228415 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.228496 kubelet[2063]: E1213 14:23:38.228425 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.228616 kubelet[2063]: E1213 14:23:38.228596 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.228616 kubelet[2063]: W1213 14:23:38.228612 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.228701 kubelet[2063]: E1213 14:23:38.228623 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.245138 kubelet[2063]: E1213 14:23:38.243933 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.245138 kubelet[2063]: W1213 14:23:38.243959 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.245138 kubelet[2063]: E1213 14:23:38.243982 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.320200 kubelet[2063]: E1213 14:23:38.320128 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.320200 kubelet[2063]: W1213 14:23:38.320160 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.320200 kubelet[2063]: E1213 14:23:38.320182 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.320596 kubelet[2063]: E1213 14:23:38.320466 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.320596 kubelet[2063]: W1213 14:23:38.320491 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.320596 kubelet[2063]: E1213 14:23:38.320526 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.320947 kubelet[2063]: E1213 14:23:38.320908 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.320947 kubelet[2063]: W1213 14:23:38.320935 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.321041 kubelet[2063]: E1213 14:23:38.320965 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.321261 kubelet[2063]: E1213 14:23:38.321242 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.321261 kubelet[2063]: W1213 14:23:38.321254 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.321404 kubelet[2063]: E1213 14:23:38.321266 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.321511 kubelet[2063]: E1213 14:23:38.321486 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.321511 kubelet[2063]: W1213 14:23:38.321498 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.321700 kubelet[2063]: E1213 14:23:38.321538 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.321700 kubelet[2063]: E1213 14:23:38.321672 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.321700 kubelet[2063]: W1213 14:23:38.321681 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.321774 kubelet[2063]: E1213 14:23:38.321724 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.321900 kubelet[2063]: E1213 14:23:38.321885 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.321900 kubelet[2063]: W1213 14:23:38.321897 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.321971 kubelet[2063]: E1213 14:23:38.321942 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.322115 kubelet[2063]: E1213 14:23:38.322100 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.322115 kubelet[2063]: W1213 14:23:38.322112 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.322200 kubelet[2063]: E1213 14:23:38.322128 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.322418 kubelet[2063]: E1213 14:23:38.322402 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.322418 kubelet[2063]: W1213 14:23:38.322415 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.322508 kubelet[2063]: E1213 14:23:38.322429 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.322620 kubelet[2063]: E1213 14:23:38.322605 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.322620 kubelet[2063]: W1213 14:23:38.322617 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.322693 kubelet[2063]: E1213 14:23:38.322638 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.322848 kubelet[2063]: E1213 14:23:38.322834 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.322848 kubelet[2063]: W1213 14:23:38.322845 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.322918 kubelet[2063]: E1213 14:23:38.322876 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.322996 kubelet[2063]: E1213 14:23:38.322982 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.322996 kubelet[2063]: W1213 14:23:38.322992 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.323084 kubelet[2063]: E1213 14:23:38.323026 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.323294 kubelet[2063]: E1213 14:23:38.323277 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.323294 kubelet[2063]: W1213 14:23:38.323288 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.323477 kubelet[2063]: E1213 14:23:38.323446 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.323591 kubelet[2063]: E1213 14:23:38.323494 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.323591 kubelet[2063]: W1213 14:23:38.323579 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.323791 kubelet[2063]: E1213 14:23:38.323677 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.323791 kubelet[2063]: E1213 14:23:38.323766 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.323791 kubelet[2063]: W1213 14:23:38.323773 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.324005 kubelet[2063]: E1213 14:23:38.323824 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.324005 kubelet[2063]: E1213 14:23:38.323896 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.324005 kubelet[2063]: W1213 14:23:38.323902 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.324005 kubelet[2063]: E1213 14:23:38.323909 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.324102 kubelet[2063]: E1213 14:23:38.324062 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.324102 kubelet[2063]: W1213 14:23:38.324070 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.324102 kubelet[2063]: E1213 14:23:38.324079 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.324302 kubelet[2063]: E1213 14:23:38.324278 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.324302 kubelet[2063]: W1213 14:23:38.324294 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.324409 kubelet[2063]: E1213 14:23:38.324310 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.324541 kubelet[2063]: E1213 14:23:38.324515 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.324541 kubelet[2063]: W1213 14:23:38.324529 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.324541 kubelet[2063]: E1213 14:23:38.324543 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.324728 kubelet[2063]: E1213 14:23:38.324708 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.324728 kubelet[2063]: W1213 14:23:38.324722 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.324800 kubelet[2063]: E1213 14:23:38.324733 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.324943 kubelet[2063]: E1213 14:23:38.324916 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.324943 kubelet[2063]: W1213 14:23:38.324931 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.325158 kubelet[2063]: E1213 14:23:38.324979 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.325158 kubelet[2063]: E1213 14:23:38.325097 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.325158 kubelet[2063]: W1213 14:23:38.325118 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.325158 kubelet[2063]: E1213 14:23:38.325147 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.325370 kubelet[2063]: E1213 14:23:38.325315 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.325370 kubelet[2063]: W1213 14:23:38.325350 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.325463 kubelet[2063]: E1213 14:23:38.325374 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.325547 kubelet[2063]: E1213 14:23:38.325531 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.325547 kubelet[2063]: W1213 14:23:38.325544 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.325596 kubelet[2063]: E1213 14:23:38.325567 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.325720 kubelet[2063]: E1213 14:23:38.325708 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.325720 kubelet[2063]: W1213 14:23:38.325718 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.325769 kubelet[2063]: E1213 14:23:38.325726 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.325957 kubelet[2063]: E1213 14:23:38.325939 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.325957 kubelet[2063]: W1213 14:23:38.325953 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.326045 kubelet[2063]: E1213 14:23:38.325964 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.336009 kubelet[2063]: E1213 14:23:38.335980 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.336200 kubelet[2063]: W1213 14:23:38.336181 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.336285 kubelet[2063]: E1213 14:23:38.336268 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.386391 kubelet[2063]: E1213 14:23:38.386312 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:38.387001 env[1211]: time="2024-12-13T14:23:38.386955747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qfkng,Uid:e62532c5-73e6-4679-b98e-e9ad59426d3e,Namespace:calico-system,Attempt:0,}" Dec 13 14:23:38.407230 env[1211]: time="2024-12-13T14:23:38.407104036Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:38.407431 env[1211]: time="2024-12-13T14:23:38.407229423Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:38.407431 env[1211]: time="2024-12-13T14:23:38.407302680Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:38.407821 env[1211]: time="2024-12-13T14:23:38.407732299Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9ae949ed6ec40beb822be0b56b4030270b29dce3c3b22ff02442b39ea9fc00a1 pid=2501 runtime=io.containerd.runc.v2 Dec 13 14:23:38.421217 systemd[1]: Started cri-containerd-9ae949ed6ec40beb822be0b56b4030270b29dce3c3b22ff02442b39ea9fc00a1.scope. Dec 13 14:23:38.423781 kubelet[2063]: E1213 14:23:38.423751 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.423781 kubelet[2063]: W1213 14:23:38.423771 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.423781 kubelet[2063]: E1213 14:23:38.423789 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.432000 audit: BPF prog-id=121 op=LOAD Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2501 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653934396564366563343062656238323262653062353662343033 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2501 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653934396564366563343062656238323262653062353662343033 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit: BPF prog-id=122 op=LOAD Dec 13 14:23:38.433000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002f1d90 items=0 ppid=2501 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653934396564366563343062656238323262653062353662343033 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit: BPF prog-id=123 op=LOAD Dec 13 14:23:38.433000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002f1dd8 items=0 ppid=2501 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653934396564366563343062656238323262653062353662343033 Dec 13 14:23:38.433000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:23:38.433000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:38.433000 audit: BPF prog-id=124 op=LOAD Dec 13 14:23:38.433000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ce1e8 items=0 ppid=2501 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653934396564366563343062656238323262653062353662343033 Dec 13 14:23:38.447705 env[1211]: time="2024-12-13T14:23:38.446274825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qfkng,Uid:e62532c5-73e6-4679-b98e-e9ad59426d3e,Namespace:calico-system,Attempt:0,} returns sandbox id \"9ae949ed6ec40beb822be0b56b4030270b29dce3c3b22ff02442b39ea9fc00a1\"" Dec 13 14:23:38.448110 kubelet[2063]: E1213 14:23:38.446970 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:38.451599 env[1211]: time="2024-12-13T14:23:38.451542993Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:23:38.524615 kubelet[2063]: E1213 14:23:38.524564 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.524615 kubelet[2063]: W1213 14:23:38.524593 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.524615 kubelet[2063]: E1213 14:23:38.524617 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.560000 audit[2537]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:38.560000 audit[2537]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fffb994b170 a2=0 a3=7fffb994b15c items=0 ppid=2268 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:38.568000 audit[2537]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:38.568000 audit[2537]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffb994b170 a2=0 a3=0 items=0 ppid=2268 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:38.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:38.625467 kubelet[2063]: E1213 14:23:38.625428 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.625467 kubelet[2063]: W1213 14:23:38.625453 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.625467 kubelet[2063]: E1213 14:23:38.625475 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.726269 kubelet[2063]: E1213 14:23:38.726154 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.726269 kubelet[2063]: W1213 14:23:38.726175 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.726269 kubelet[2063]: E1213 14:23:38.726193 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.826935 kubelet[2063]: E1213 14:23:38.826882 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.826935 kubelet[2063]: W1213 14:23:38.826907 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.826935 kubelet[2063]: E1213 14:23:38.826929 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:38.928401 kubelet[2063]: E1213 14:23:38.928352 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:38.928401 kubelet[2063]: W1213 14:23:38.928374 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:38.928401 kubelet[2063]: E1213 14:23:38.928395 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.030054 kubelet[2063]: E1213 14:23:39.029916 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.030054 kubelet[2063]: W1213 14:23:39.029938 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.030054 kubelet[2063]: E1213 14:23:39.029957 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.120553 kubelet[2063]: E1213 14:23:39.120490 2063 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 14:23:39.120749 kubelet[2063]: E1213 14:23:39.120602 2063 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/14ecb31e-fd64-4ecb-9148-aa6591f2740c-typha-certs podName:14ecb31e-fd64-4ecb-9148-aa6591f2740c nodeName:}" failed. No retries permitted until 2024-12-13 14:23:39.620581224 +0000 UTC m=+24.727579835 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/14ecb31e-fd64-4ecb-9148-aa6591f2740c-typha-certs") pod "calico-typha-765c6ddf54-lqwqw" (UID: "14ecb31e-fd64-4ecb-9148-aa6591f2740c") : failed to sync secret cache: timed out waiting for the condition Dec 13 14:23:39.131161 kubelet[2063]: E1213 14:23:39.131106 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.131161 kubelet[2063]: W1213 14:23:39.131151 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.131379 kubelet[2063]: E1213 14:23:39.131183 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.232610 kubelet[2063]: E1213 14:23:39.232573 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.232610 kubelet[2063]: W1213 14:23:39.232600 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.232610 kubelet[2063]: E1213 14:23:39.232620 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.334043 kubelet[2063]: E1213 14:23:39.334000 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.334043 kubelet[2063]: W1213 14:23:39.334028 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.334269 kubelet[2063]: E1213 14:23:39.334075 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.435043 kubelet[2063]: E1213 14:23:39.434997 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.435043 kubelet[2063]: W1213 14:23:39.435018 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.435043 kubelet[2063]: E1213 14:23:39.435035 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.536840 kubelet[2063]: E1213 14:23:39.536761 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.536840 kubelet[2063]: W1213 14:23:39.536795 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.536840 kubelet[2063]: E1213 14:23:39.536822 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.639530 kubelet[2063]: E1213 14:23:39.639408 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.639530 kubelet[2063]: W1213 14:23:39.639433 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.639530 kubelet[2063]: E1213 14:23:39.639458 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.639755 kubelet[2063]: E1213 14:23:39.639741 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.639755 kubelet[2063]: W1213 14:23:39.639753 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.639812 kubelet[2063]: E1213 14:23:39.639761 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.639950 kubelet[2063]: E1213 14:23:39.639930 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.640052 kubelet[2063]: W1213 14:23:39.640016 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.640052 kubelet[2063]: E1213 14:23:39.640047 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.640302 kubelet[2063]: E1213 14:23:39.640286 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.640302 kubelet[2063]: W1213 14:23:39.640297 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.640411 kubelet[2063]: E1213 14:23:39.640304 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.640558 kubelet[2063]: E1213 14:23:39.640534 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.640558 kubelet[2063]: W1213 14:23:39.640545 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.640558 kubelet[2063]: E1213 14:23:39.640554 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.646906 kubelet[2063]: E1213 14:23:39.646860 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:39.646906 kubelet[2063]: W1213 14:23:39.646891 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:39.647107 kubelet[2063]: E1213 14:23:39.646917 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:39.712777 kubelet[2063]: E1213 14:23:39.712734 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:39.713508 env[1211]: time="2024-12-13T14:23:39.713465384Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-765c6ddf54-lqwqw,Uid:14ecb31e-fd64-4ecb-9148-aa6591f2740c,Namespace:calico-system,Attempt:0,}" Dec 13 14:23:39.969988 kubelet[2063]: E1213 14:23:39.969834 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:40.095990 env[1211]: time="2024-12-13T14:23:40.095867687Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:40.095990 env[1211]: time="2024-12-13T14:23:40.095944111Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:40.095990 env[1211]: time="2024-12-13T14:23:40.095959349Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:40.103984 env[1211]: time="2024-12-13T14:23:40.096324606Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f51f3a8ae45b387e10789af191f85d009cfbf65ef3b81c8248b11a51f9bf6f9e pid=2561 runtime=io.containerd.runc.v2 Dec 13 14:23:40.123967 systemd[1]: Started cri-containerd-f51f3a8ae45b387e10789af191f85d009cfbf65ef3b81c8248b11a51f9bf6f9e.scope. Dec 13 14:23:40.131728 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1530015432.mount: Deactivated successfully. Dec 13 14:23:40.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143651 kernel: kauditd_printk_skb: 122 callbacks suppressed Dec 13 14:23:40.144025 kernel: audit: type=1400 audit(1734099820.137:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.144071 kernel: audit: type=1400 audit(1734099820.137:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.147670 kernel: audit: type=1400 audit(1734099820.137:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.151313 kernel: audit: type=1400 audit(1734099820.137:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.165760 kernel: audit: type=1400 audit(1734099820.137:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.165876 kernel: audit: type=1400 audit(1734099820.137:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.165908 kernel: audit: type=1400 audit(1734099820.137:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.173052 kernel: audit: type=1400 audit(1734099820.137:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.181381 kernel: audit: type=1400 audit(1734099820.137:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.181570 kernel: audit: type=1400 audit(1734099820.142:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.142000 audit: BPF prog-id=125 op=LOAD Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2561 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635316633613861653435623338376531303738396166313931663835 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2561 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635316633613861653435623338376531303738396166313931663835 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.143000 audit: BPF prog-id=126 op=LOAD Dec 13 14:23:40.143000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000b3d90 items=0 ppid=2561 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635316633613861653435623338376531303738396166313931663835 Dec 13 14:23:40.146000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.146000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.146000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.146000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.146000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.146000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.146000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.146000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.146000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.146000 audit: BPF prog-id=127 op=LOAD Dec 13 14:23:40.146000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000b3dd8 items=0 ppid=2561 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635316633613861653435623338376531303738396166313931663835 Dec 13 14:23:40.153000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:23:40.153000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.153000 audit: BPF prog-id=128 op=LOAD Dec 13 14:23:40.153000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0004181e8 items=0 ppid=2561 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635316633613861653435623338376531303738396166313931663835 Dec 13 14:23:40.197776 env[1211]: time="2024-12-13T14:23:40.197717471Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-765c6ddf54-lqwqw,Uid:14ecb31e-fd64-4ecb-9148-aa6591f2740c,Namespace:calico-system,Attempt:0,} returns sandbox id \"f51f3a8ae45b387e10789af191f85d009cfbf65ef3b81c8248b11a51f9bf6f9e\"" Dec 13 14:23:40.199111 kubelet[2063]: E1213 14:23:40.199069 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:40.353517 env[1211]: time="2024-12-13T14:23:40.353458479Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:40.356151 env[1211]: time="2024-12-13T14:23:40.356098857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:40.359169 env[1211]: time="2024-12-13T14:23:40.359112387Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:40.361206 env[1211]: time="2024-12-13T14:23:40.361158688Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:40.361623 env[1211]: time="2024-12-13T14:23:40.361584549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:23:40.364368 env[1211]: time="2024-12-13T14:23:40.362858146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:23:40.364368 env[1211]: time="2024-12-13T14:23:40.364262378Z" level=info msg="CreateContainer within sandbox \"9ae949ed6ec40beb822be0b56b4030270b29dce3c3b22ff02442b39ea9fc00a1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:23:40.381966 env[1211]: time="2024-12-13T14:23:40.381904875Z" level=info msg="CreateContainer within sandbox \"9ae949ed6ec40beb822be0b56b4030270b29dce3c3b22ff02442b39ea9fc00a1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9a4154b4468b259ac0ffeb8087982830e6981c992d073cb21b798ec3cd03fb1c\"" Dec 13 14:23:40.382630 env[1211]: time="2024-12-13T14:23:40.382580987Z" level=info msg="StartContainer for \"9a4154b4468b259ac0ffeb8087982830e6981c992d073cb21b798ec3cd03fb1c\"" Dec 13 14:23:40.403534 systemd[1]: Started cri-containerd-9a4154b4468b259ac0ffeb8087982830e6981c992d073cb21b798ec3cd03fb1c.scope. Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f32d6251138 items=0 ppid=2501 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961343135346234343638623235396163306666656238303837393832 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit: BPF prog-id=129 op=LOAD Dec 13 14:23:40.421000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000182c88 items=0 ppid=2501 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961343135346234343638623235396163306666656238303837393832 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit: BPF prog-id=130 op=LOAD Dec 13 14:23:40.421000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000182cd8 items=0 ppid=2501 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961343135346234343638623235396163306666656238303837393832 Dec 13 14:23:40.421000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:23:40.421000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:40.421000 audit: BPF prog-id=131 op=LOAD Dec 13 14:23:40.421000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000182d68 items=0 ppid=2501 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:40.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961343135346234343638623235396163306666656238303837393832 Dec 13 14:23:40.439155 env[1211]: time="2024-12-13T14:23:40.439061312Z" level=info msg="StartContainer for \"9a4154b4468b259ac0ffeb8087982830e6981c992d073cb21b798ec3cd03fb1c\" returns successfully" Dec 13 14:23:40.449593 systemd[1]: cri-containerd-9a4154b4468b259ac0ffeb8087982830e6981c992d073cb21b798ec3cd03fb1c.scope: Deactivated successfully. Dec 13 14:23:40.452000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:23:40.472640 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9a4154b4468b259ac0ffeb8087982830e6981c992d073cb21b798ec3cd03fb1c-rootfs.mount: Deactivated successfully. Dec 13 14:23:41.041125 kubelet[2063]: E1213 14:23:41.041077 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:41.150354 env[1211]: time="2024-12-13T14:23:41.150221919Z" level=info msg="shim disconnected" id=9a4154b4468b259ac0ffeb8087982830e6981c992d073cb21b798ec3cd03fb1c Dec 13 14:23:41.150354 env[1211]: time="2024-12-13T14:23:41.150298242Z" level=warning msg="cleaning up after shim disconnected" id=9a4154b4468b259ac0ffeb8087982830e6981c992d073cb21b798ec3cd03fb1c namespace=k8s.io Dec 13 14:23:41.150354 env[1211]: time="2024-12-13T14:23:41.150311577Z" level=info msg="cleaning up dead shim" Dec 13 14:23:41.157971 env[1211]: time="2024-12-13T14:23:41.157897799Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:23:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2647 runtime=io.containerd.runc.v2\n" Dec 13 14:23:41.970428 kubelet[2063]: E1213 14:23:41.970352 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:42.043631 kubelet[2063]: E1213 14:23:42.043597 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:43.970710 kubelet[2063]: E1213 14:23:43.970635 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:45.481187 env[1211]: time="2024-12-13T14:23:45.481112206Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:45.483505 env[1211]: time="2024-12-13T14:23:45.483457676Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:45.485617 env[1211]: time="2024-12-13T14:23:45.485583853Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:45.487262 env[1211]: time="2024-12-13T14:23:45.487225368Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:45.487756 env[1211]: time="2024-12-13T14:23:45.487724276Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:23:45.488903 env[1211]: time="2024-12-13T14:23:45.488880150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:23:45.494997 env[1211]: time="2024-12-13T14:23:45.494931685Z" level=info msg="CreateContainer within sandbox \"f51f3a8ae45b387e10789af191f85d009cfbf65ef3b81c8248b11a51f9bf6f9e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:23:45.522471 env[1211]: time="2024-12-13T14:23:45.522381569Z" level=info msg="CreateContainer within sandbox \"f51f3a8ae45b387e10789af191f85d009cfbf65ef3b81c8248b11a51f9bf6f9e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"fd81a7a55950c5bcec202880e76093333f84ec8ac99155f4099757dd55a3c25f\"" Dec 13 14:23:45.523278 env[1211]: time="2024-12-13T14:23:45.523255451Z" level=info msg="StartContainer for \"fd81a7a55950c5bcec202880e76093333f84ec8ac99155f4099757dd55a3c25f\"" Dec 13 14:23:45.544449 systemd[1]: Started cri-containerd-fd81a7a55950c5bcec202880e76093333f84ec8ac99155f4099757dd55a3c25f.scope. Dec 13 14:23:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564383 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 14:23:45.564470 kernel: audit: type=1400 audit(1734099825.558:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564496 kernel: audit: type=1400 audit(1734099825.558:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.571122 kernel: audit: type=1400 audit(1734099825.558:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.571184 kernel: audit: type=1400 audit(1734099825.558:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.574587 kernel: audit: type=1400 audit(1734099825.558:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.577483 kernel: audit: type=1400 audit(1734099825.558:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.584009 kernel: audit: type=1400 audit(1734099825.558:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.584181 kernel: audit: type=1400 audit(1734099825.558:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.587186 kernel: audit: type=1400 audit(1734099825.558:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.590375 kernel: audit: type=1400 audit(1734099825.563:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.563000 audit: BPF prog-id=132 op=LOAD Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2561 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:45.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664383161376135353935306335626365633230323838306537363039 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=2561 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:45.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664383161376135353935306335626365633230323838306537363039 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.564000 audit: BPF prog-id=133 op=LOAD Dec 13 14:23:45.564000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00030b7e0 items=0 ppid=2561 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:45.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664383161376135353935306335626365633230323838306537363039 Dec 13 14:23:45.566000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.566000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.566000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.566000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.566000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.566000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.566000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.566000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.566000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.566000 audit: BPF prog-id=134 op=LOAD Dec 13 14:23:45.566000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00030b828 items=0 ppid=2561 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:45.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664383161376135353935306335626365633230323838306537363039 Dec 13 14:23:45.569000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:23:45.569000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:45.569000 audit: BPF prog-id=135 op=LOAD Dec 13 14:23:45.569000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00030bc38 items=0 ppid=2561 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:45.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664383161376135353935306335626365633230323838306537363039 Dec 13 14:23:45.619374 env[1211]: time="2024-12-13T14:23:45.619291480Z" level=info msg="StartContainer for \"fd81a7a55950c5bcec202880e76093333f84ec8ac99155f4099757dd55a3c25f\" returns successfully" Dec 13 14:23:45.969898 kubelet[2063]: E1213 14:23:45.969838 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:46.051398 kubelet[2063]: E1213 14:23:46.051359 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:46.217081 kubelet[2063]: I1213 14:23:46.216992 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-765c6ddf54-lqwqw" podStartSLOduration=3.928320548 podStartE2EDuration="9.216972632s" podCreationTimestamp="2024-12-13 14:23:37 +0000 UTC" firstStartedPulling="2024-12-13 14:23:40.200094995 +0000 UTC m=+25.307093606" lastFinishedPulling="2024-12-13 14:23:45.488747079 +0000 UTC m=+30.595745690" observedRunningTime="2024-12-13 14:23:46.216970768 +0000 UTC m=+31.323969389" watchObservedRunningTime="2024-12-13 14:23:46.216972632 +0000 UTC m=+31.323971253" Dec 13 14:23:47.052928 kubelet[2063]: I1213 14:23:47.052888 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:23:47.053616 kubelet[2063]: E1213 14:23:47.053579 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:47.969705 kubelet[2063]: E1213 14:23:47.969632 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:49.969935 kubelet[2063]: E1213 14:23:49.969873 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:50.914389 kubelet[2063]: I1213 14:23:50.914298 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:23:50.927835 kubelet[2063]: E1213 14:23:50.927796 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:51.062651 kubelet[2063]: E1213 14:23:51.062241 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:51.088000 audit[2702]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:51.090905 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:23:51.090974 kernel: audit: type=1325 audit(1734099831.088:997): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:51.088000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc52019ce0 a2=0 a3=7ffc52019ccc items=0 ppid=2268 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:51.098841 kernel: audit: type=1300 audit(1734099831.088:997): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc52019ce0 a2=0 a3=7ffc52019ccc items=0 ppid=2268 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:51.098950 kernel: audit: type=1327 audit(1734099831.088:997): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:51.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:51.107000 audit[2702]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:51.107000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc52019ce0 a2=0 a3=7ffc52019ccc items=0 ppid=2268 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:51.135961 kernel: audit: type=1325 audit(1734099831.107:998): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:51.136135 kernel: audit: type=1300 audit(1734099831.107:998): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc52019ce0 a2=0 a3=7ffc52019ccc items=0 ppid=2268 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:51.136157 kernel: audit: type=1327 audit(1734099831.107:998): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:51.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:51.970585 kubelet[2063]: E1213 14:23:51.970513 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:53.970069 kubelet[2063]: E1213 14:23:53.969983 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:56.282595 kubelet[2063]: E1213 14:23:56.282517 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:56.507165 env[1211]: time="2024-12-13T14:23:56.507097966Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:56.509134 env[1211]: time="2024-12-13T14:23:56.509072934Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:56.511527 env[1211]: time="2024-12-13T14:23:56.511491705Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:56.513689 env[1211]: time="2024-12-13T14:23:56.513626915Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:56.514127 env[1211]: time="2024-12-13T14:23:56.514085957Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:23:56.516601 env[1211]: time="2024-12-13T14:23:56.516561424Z" level=info msg="CreateContainer within sandbox \"9ae949ed6ec40beb822be0b56b4030270b29dce3c3b22ff02442b39ea9fc00a1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:23:56.537873 env[1211]: time="2024-12-13T14:23:56.537737324Z" level=info msg="CreateContainer within sandbox \"9ae949ed6ec40beb822be0b56b4030270b29dce3c3b22ff02442b39ea9fc00a1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7f3ac769ceb4e4c4273a6ed21c3d8a0ea760386f704f253b053864f67b8095e3\"" Dec 13 14:23:56.538604 env[1211]: time="2024-12-13T14:23:56.538513562Z" level=info msg="StartContainer for \"7f3ac769ceb4e4c4273a6ed21c3d8a0ea760386f704f253b053864f67b8095e3\"" Dec 13 14:23:56.557599 systemd[1]: Started cri-containerd-7f3ac769ceb4e4c4273a6ed21c3d8a0ea760386f704f253b053864f67b8095e3.scope. Dec 13 14:23:56.586362 kernel: audit: type=1400 audit(1734099836.571:999): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.586570 kernel: audit: type=1300 audit(1734099836.571:999): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fea8d7a4118 items=0 ppid=2501 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:56.586611 kernel: audit: type=1327 audit(1734099836.571:999): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336163373639636562346534633432373361366564323163336438 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fea8d7a4118 items=0 ppid=2501 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:56.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336163373639636562346534633432373361366564323163336438 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.593142 kernel: audit: type=1400 audit(1734099836.571:1000): avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.593223 kernel: audit: type=1400 audit(1734099836.571:1000): avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.593242 kernel: audit: type=1400 audit(1734099836.571:1000): avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.599866 kernel: audit: type=1400 audit(1734099836.571:1000): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.599953 kernel: audit: type=1400 audit(1734099836.571:1000): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.601111 env[1211]: time="2024-12-13T14:23:56.601048186Z" level=info msg="StartContainer for \"7f3ac769ceb4e4c4273a6ed21c3d8a0ea760386f704f253b053864f67b8095e3\" returns successfully" Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.611670 kernel: audit: type=1400 audit(1734099836.571:1000): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.611762 kernel: audit: type=1400 audit(1734099836.571:1000): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.571000 audit: BPF prog-id=136 op=LOAD Dec 13 14:23:56.571000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000302898 items=0 ppid=2501 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:56.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336163373639636562346534633432373361366564323163336438 Dec 13 14:23:56.575000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.575000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.575000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.575000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.575000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.575000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.575000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.575000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.575000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.575000 audit: BPF prog-id=137 op=LOAD Dec 13 14:23:56.575000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003028e8 items=0 ppid=2501 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:56.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336163373639636562346534633432373361366564323163336438 Dec 13 14:23:56.580000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:23:56.580000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:56.580000 audit: BPF prog-id=138 op=LOAD Dec 13 14:23:56.580000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000302978 items=0 ppid=2501 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:56.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336163373639636562346534633432373361366564323163336438 Dec 13 14:23:57.285215 kubelet[2063]: E1213 14:23:57.285162 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:57.536977 systemd[1]: Started sshd@7-10.0.0.64:22-10.0.0.1:50134.service. Dec 13 14:23:57.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.64:22-10.0.0.1:50134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:57.646000 audit[2738]: USER_ACCT pid=2738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:57.647989 sshd[2738]: Accepted publickey for core from 10.0.0.1 port 50134 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:23:57.647000 audit[2738]: CRED_ACQ pid=2738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:57.647000 audit[2738]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7c876280 a2=3 a3=0 items=0 ppid=1 pid=2738 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:57.647000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:57.648986 sshd[2738]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:57.655369 systemd-logind[1198]: New session 8 of user core. Dec 13 14:23:57.656646 systemd[1]: Started session-8.scope. Dec 13 14:23:57.660000 audit[2738]: USER_START pid=2738 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:57.662000 audit[2740]: CRED_ACQ pid=2740 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:57.832977 sshd[2738]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:57.835000 audit[2738]: USER_END pid=2738 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:57.836000 audit[2738]: CRED_DISP pid=2738 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:23:57.839043 systemd[1]: sshd@7-10.0.0.64:22-10.0.0.1:50134.service: Deactivated successfully. Dec 13 14:23:57.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.64:22-10.0.0.1:50134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:57.839775 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:23:57.840516 systemd-logind[1198]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:23:57.841481 systemd-logind[1198]: Removed session 8. Dec 13 14:23:57.970143 kubelet[2063]: E1213 14:23:57.970073 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:23:58.249863 env[1211]: time="2024-12-13T14:23:58.249665000Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:23:58.252257 systemd[1]: cri-containerd-7f3ac769ceb4e4c4273a6ed21c3d8a0ea760386f704f253b053864f67b8095e3.scope: Deactivated successfully. Dec 13 14:23:58.256000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:23:58.272806 kubelet[2063]: I1213 14:23:58.272745 2063 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:23:58.276840 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7f3ac769ceb4e4c4273a6ed21c3d8a0ea760386f704f253b053864f67b8095e3-rootfs.mount: Deactivated successfully. Dec 13 14:23:58.286535 kubelet[2063]: E1213 14:23:58.286499 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:58.370433 env[1211]: time="2024-12-13T14:23:58.370356677Z" level=info msg="shim disconnected" id=7f3ac769ceb4e4c4273a6ed21c3d8a0ea760386f704f253b053864f67b8095e3 Dec 13 14:23:58.370433 env[1211]: time="2024-12-13T14:23:58.370412382Z" level=warning msg="cleaning up after shim disconnected" id=7f3ac769ceb4e4c4273a6ed21c3d8a0ea760386f704f253b053864f67b8095e3 namespace=k8s.io Dec 13 14:23:58.370433 env[1211]: time="2024-12-13T14:23:58.370423503Z" level=info msg="cleaning up dead shim" Dec 13 14:23:58.383013 env[1211]: time="2024-12-13T14:23:58.381000089Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:23:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2764 runtime=io.containerd.runc.v2\n" Dec 13 14:23:58.384348 kubelet[2063]: I1213 14:23:58.384274 2063 topology_manager.go:215] "Topology Admit Handler" podUID="4d0ecf8c-eff9-4e38-bacc-eef2062b0986" podNamespace="kube-system" podName="coredns-7db6d8ff4d-hkn7l" Dec 13 14:23:58.385574 kubelet[2063]: I1213 14:23:58.384570 2063 topology_manager.go:215] "Topology Admit Handler" podUID="2572bf71-9a1c-40af-ad41-437d084decfc" podNamespace="calico-system" podName="calico-kube-controllers-74f7f4574c-94t6k" Dec 13 14:23:58.385574 kubelet[2063]: I1213 14:23:58.384656 2063 topology_manager.go:215] "Topology Admit Handler" podUID="d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707" podNamespace="calico-apiserver" podName="calico-apiserver-75b975477b-nszs5" Dec 13 14:23:58.385574 kubelet[2063]: I1213 14:23:58.384729 2063 topology_manager.go:215] "Topology Admit Handler" podUID="47799421-d9fd-4a18-a210-2a5bfacc15c2" podNamespace="calico-apiserver" podName="calico-apiserver-75b975477b-d62c8" Dec 13 14:23:58.385574 kubelet[2063]: I1213 14:23:58.384987 2063 topology_manager.go:215] "Topology Admit Handler" podUID="b633c2aa-9d15-49a8-9287-88df5df00fe6" podNamespace="kube-system" podName="coredns-7db6d8ff4d-t86p8" Dec 13 14:23:58.390606 systemd[1]: Created slice kubepods-besteffort-pod47799421_d9fd_4a18_a210_2a5bfacc15c2.slice. Dec 13 14:23:58.397524 systemd[1]: Created slice kubepods-burstable-pod4d0ecf8c_eff9_4e38_bacc_eef2062b0986.slice. Dec 13 14:23:58.404138 systemd[1]: Created slice kubepods-burstable-podb633c2aa_9d15_49a8_9287_88df5df00fe6.slice. Dec 13 14:23:58.408621 systemd[1]: Created slice kubepods-besteffort-pod2572bf71_9a1c_40af_ad41_437d084decfc.slice. Dec 13 14:23:58.414642 systemd[1]: Created slice kubepods-besteffort-podd448b4dd_4bbb_4e2d_8ce8_4a5ebfe65707.slice. Dec 13 14:23:58.472422 kubelet[2063]: I1213 14:23:58.472360 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jqfnn\" (UniqueName: \"kubernetes.io/projected/d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707-kube-api-access-jqfnn\") pod \"calico-apiserver-75b975477b-nszs5\" (UID: \"d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707\") " pod="calico-apiserver/calico-apiserver-75b975477b-nszs5" Dec 13 14:23:58.472638 kubelet[2063]: I1213 14:23:58.472442 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707-calico-apiserver-certs\") pod \"calico-apiserver-75b975477b-nszs5\" (UID: \"d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707\") " pod="calico-apiserver/calico-apiserver-75b975477b-nszs5" Dec 13 14:23:58.472638 kubelet[2063]: I1213 14:23:58.472465 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/47799421-d9fd-4a18-a210-2a5bfacc15c2-calico-apiserver-certs\") pod \"calico-apiserver-75b975477b-d62c8\" (UID: \"47799421-d9fd-4a18-a210-2a5bfacc15c2\") " pod="calico-apiserver/calico-apiserver-75b975477b-d62c8" Dec 13 14:23:58.472638 kubelet[2063]: I1213 14:23:58.472493 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4d0ecf8c-eff9-4e38-bacc-eef2062b0986-config-volume\") pod \"coredns-7db6d8ff4d-hkn7l\" (UID: \"4d0ecf8c-eff9-4e38-bacc-eef2062b0986\") " pod="kube-system/coredns-7db6d8ff4d-hkn7l" Dec 13 14:23:58.472638 kubelet[2063]: I1213 14:23:58.472527 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jxswd\" (UniqueName: \"kubernetes.io/projected/4d0ecf8c-eff9-4e38-bacc-eef2062b0986-kube-api-access-jxswd\") pod \"coredns-7db6d8ff4d-hkn7l\" (UID: \"4d0ecf8c-eff9-4e38-bacc-eef2062b0986\") " pod="kube-system/coredns-7db6d8ff4d-hkn7l" Dec 13 14:23:58.472638 kubelet[2063]: I1213 14:23:58.472549 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b633c2aa-9d15-49a8-9287-88df5df00fe6-config-volume\") pod \"coredns-7db6d8ff4d-t86p8\" (UID: \"b633c2aa-9d15-49a8-9287-88df5df00fe6\") " pod="kube-system/coredns-7db6d8ff4d-t86p8" Dec 13 14:23:58.472769 kubelet[2063]: I1213 14:23:58.472567 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2572bf71-9a1c-40af-ad41-437d084decfc-tigera-ca-bundle\") pod \"calico-kube-controllers-74f7f4574c-94t6k\" (UID: \"2572bf71-9a1c-40af-ad41-437d084decfc\") " pod="calico-system/calico-kube-controllers-74f7f4574c-94t6k" Dec 13 14:23:58.472769 kubelet[2063]: I1213 14:23:58.472588 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sdxq7\" (UniqueName: \"kubernetes.io/projected/47799421-d9fd-4a18-a210-2a5bfacc15c2-kube-api-access-sdxq7\") pod \"calico-apiserver-75b975477b-d62c8\" (UID: \"47799421-d9fd-4a18-a210-2a5bfacc15c2\") " pod="calico-apiserver/calico-apiserver-75b975477b-d62c8" Dec 13 14:23:58.472769 kubelet[2063]: I1213 14:23:58.472654 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5qkh8\" (UniqueName: \"kubernetes.io/projected/2572bf71-9a1c-40af-ad41-437d084decfc-kube-api-access-5qkh8\") pod \"calico-kube-controllers-74f7f4574c-94t6k\" (UID: \"2572bf71-9a1c-40af-ad41-437d084decfc\") " pod="calico-system/calico-kube-controllers-74f7f4574c-94t6k" Dec 13 14:23:58.472769 kubelet[2063]: I1213 14:23:58.472730 2063 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-67cvf\" (UniqueName: \"kubernetes.io/projected/b633c2aa-9d15-49a8-9287-88df5df00fe6-kube-api-access-67cvf\") pod \"coredns-7db6d8ff4d-t86p8\" (UID: \"b633c2aa-9d15-49a8-9287-88df5df00fe6\") " pod="kube-system/coredns-7db6d8ff4d-t86p8" Dec 13 14:23:58.697489 env[1211]: time="2024-12-13T14:23:58.697416394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b975477b-d62c8,Uid:47799421-d9fd-4a18-a210-2a5bfacc15c2,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:23:58.700661 kubelet[2063]: E1213 14:23:58.700621 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:58.700957 env[1211]: time="2024-12-13T14:23:58.700929348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-hkn7l,Uid:4d0ecf8c-eff9-4e38-bacc-eef2062b0986,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:58.706753 kubelet[2063]: E1213 14:23:58.706705 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:58.707315 env[1211]: time="2024-12-13T14:23:58.707273188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-t86p8,Uid:b633c2aa-9d15-49a8-9287-88df5df00fe6,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:58.712763 env[1211]: time="2024-12-13T14:23:58.712707921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74f7f4574c-94t6k,Uid:2572bf71-9a1c-40af-ad41-437d084decfc,Namespace:calico-system,Attempt:0,}" Dec 13 14:23:58.717458 env[1211]: time="2024-12-13T14:23:58.717417262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b975477b-nszs5,Uid:d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:23:58.831441 env[1211]: time="2024-12-13T14:23:58.831349349Z" level=error msg="Failed to destroy network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.831837 env[1211]: time="2024-12-13T14:23:58.831801648Z" level=error msg="encountered an error cleaning up failed sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.832013 env[1211]: time="2024-12-13T14:23:58.831964583Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b975477b-d62c8,Uid:47799421-d9fd-4a18-a210-2a5bfacc15c2,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.832503 kubelet[2063]: E1213 14:23:58.832451 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.832624 kubelet[2063]: E1213 14:23:58.832539 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75b975477b-d62c8" Dec 13 14:23:58.832624 kubelet[2063]: E1213 14:23:58.832565 2063 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75b975477b-d62c8" Dec 13 14:23:58.832624 kubelet[2063]: E1213 14:23:58.832610 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75b975477b-d62c8_calico-apiserver(47799421-d9fd-4a18-a210-2a5bfacc15c2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75b975477b-d62c8_calico-apiserver(47799421-d9fd-4a18-a210-2a5bfacc15c2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75b975477b-d62c8" podUID="47799421-d9fd-4a18-a210-2a5bfacc15c2" Dec 13 14:23:58.835089 env[1211]: time="2024-12-13T14:23:58.835032122Z" level=error msg="Failed to destroy network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.835585 env[1211]: time="2024-12-13T14:23:58.835534235Z" level=error msg="encountered an error cleaning up failed sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.835929 env[1211]: time="2024-12-13T14:23:58.835864275Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-hkn7l,Uid:4d0ecf8c-eff9-4e38-bacc-eef2062b0986,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.836165 kubelet[2063]: E1213 14:23:58.836126 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.836236 kubelet[2063]: E1213 14:23:58.836189 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-hkn7l" Dec 13 14:23:58.836236 kubelet[2063]: E1213 14:23:58.836214 2063 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-hkn7l" Dec 13 14:23:58.836305 kubelet[2063]: E1213 14:23:58.836268 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-hkn7l_kube-system(4d0ecf8c-eff9-4e38-bacc-eef2062b0986)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-hkn7l_kube-system(4d0ecf8c-eff9-4e38-bacc-eef2062b0986)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-hkn7l" podUID="4d0ecf8c-eff9-4e38-bacc-eef2062b0986" Dec 13 14:23:58.890029 env[1211]: time="2024-12-13T14:23:58.889954069Z" level=error msg="Failed to destroy network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.890896 env[1211]: time="2024-12-13T14:23:58.890845953Z" level=error msg="encountered an error cleaning up failed sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.890962 env[1211]: time="2024-12-13T14:23:58.890920594Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-t86p8,Uid:b633c2aa-9d15-49a8-9287-88df5df00fe6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.891248 kubelet[2063]: E1213 14:23:58.891204 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.891456 kubelet[2063]: E1213 14:23:58.891266 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-t86p8" Dec 13 14:23:58.891456 kubelet[2063]: E1213 14:23:58.891295 2063 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-t86p8" Dec 13 14:23:58.891456 kubelet[2063]: E1213 14:23:58.891373 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-t86p8_kube-system(b633c2aa-9d15-49a8-9287-88df5df00fe6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-t86p8_kube-system(b633c2aa-9d15-49a8-9287-88df5df00fe6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-t86p8" podUID="b633c2aa-9d15-49a8-9287-88df5df00fe6" Dec 13 14:23:58.948786 env[1211]: time="2024-12-13T14:23:58.948613391Z" level=error msg="Failed to destroy network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.949938 env[1211]: time="2024-12-13T14:23:58.949864911Z" level=error msg="encountered an error cleaning up failed sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.950155 env[1211]: time="2024-12-13T14:23:58.950019210Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74f7f4574c-94t6k,Uid:2572bf71-9a1c-40af-ad41-437d084decfc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.950312 kubelet[2063]: E1213 14:23:58.950275 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.950416 kubelet[2063]: E1213 14:23:58.950348 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74f7f4574c-94t6k" Dec 13 14:23:58.950461 kubelet[2063]: E1213 14:23:58.950410 2063 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74f7f4574c-94t6k" Dec 13 14:23:58.950570 kubelet[2063]: E1213 14:23:58.950524 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74f7f4574c-94t6k_calico-system(2572bf71-9a1c-40af-ad41-437d084decfc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74f7f4574c-94t6k_calico-system(2572bf71-9a1c-40af-ad41-437d084decfc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74f7f4574c-94t6k" podUID="2572bf71-9a1c-40af-ad41-437d084decfc" Dec 13 14:23:58.977773 env[1211]: time="2024-12-13T14:23:58.977690718Z" level=error msg="Failed to destroy network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.978158 env[1211]: time="2024-12-13T14:23:58.978112961Z" level=error msg="encountered an error cleaning up failed sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.978212 env[1211]: time="2024-12-13T14:23:58.978174998Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b975477b-nszs5,Uid:d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.978502 kubelet[2063]: E1213 14:23:58.978439 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:58.978580 kubelet[2063]: E1213 14:23:58.978510 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75b975477b-nszs5" Dec 13 14:23:58.978580 kubelet[2063]: E1213 14:23:58.978535 2063 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75b975477b-nszs5" Dec 13 14:23:58.978662 kubelet[2063]: E1213 14:23:58.978589 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75b975477b-nszs5_calico-apiserver(d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75b975477b-nszs5_calico-apiserver(d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75b975477b-nszs5" podUID="d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707" Dec 13 14:23:59.291937 kubelet[2063]: E1213 14:23:59.291114 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:23:59.297130 env[1211]: time="2024-12-13T14:23:59.297070981Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:23:59.297600 kubelet[2063]: I1213 14:23:59.297186 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:23:59.298094 env[1211]: time="2024-12-13T14:23:59.298042435Z" level=info msg="StopPodSandbox for \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\"" Dec 13 14:23:59.300121 kubelet[2063]: I1213 14:23:59.300080 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Dec 13 14:23:59.300647 env[1211]: time="2024-12-13T14:23:59.300608132Z" level=info msg="StopPodSandbox for \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\"" Dec 13 14:23:59.302948 kubelet[2063]: I1213 14:23:59.302694 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:23:59.303454 env[1211]: time="2024-12-13T14:23:59.303382439Z" level=info msg="StopPodSandbox for \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\"" Dec 13 14:23:59.306026 kubelet[2063]: I1213 14:23:59.305126 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:23:59.306152 env[1211]: time="2024-12-13T14:23:59.305906518Z" level=info msg="StopPodSandbox for \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\"" Dec 13 14:23:59.306885 kubelet[2063]: I1213 14:23:59.306855 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:23:59.307407 env[1211]: time="2024-12-13T14:23:59.307364344Z" level=info msg="StopPodSandbox for \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\"" Dec 13 14:23:59.348808 env[1211]: time="2024-12-13T14:23:59.348730307Z" level=error msg="StopPodSandbox for \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\" failed" error="failed to destroy network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:59.349371 kubelet[2063]: E1213 14:23:59.349302 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Dec 13 14:23:59.349473 kubelet[2063]: E1213 14:23:59.349394 2063 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2"} Dec 13 14:23:59.349473 kubelet[2063]: E1213 14:23:59.349469 2063 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b633c2aa-9d15-49a8-9287-88df5df00fe6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:59.349590 kubelet[2063]: E1213 14:23:59.349493 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b633c2aa-9d15-49a8-9287-88df5df00fe6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-t86p8" podUID="b633c2aa-9d15-49a8-9287-88df5df00fe6" Dec 13 14:23:59.364240 env[1211]: time="2024-12-13T14:23:59.364178816Z" level=error msg="StopPodSandbox for \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\" failed" error="failed to destroy network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:59.364758 kubelet[2063]: E1213 14:23:59.364702 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:23:59.364852 kubelet[2063]: E1213 14:23:59.364789 2063 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9"} Dec 13 14:23:59.364881 kubelet[2063]: E1213 14:23:59.364844 2063 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47799421-d9fd-4a18-a210-2a5bfacc15c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:59.364956 kubelet[2063]: E1213 14:23:59.364882 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47799421-d9fd-4a18-a210-2a5bfacc15c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75b975477b-d62c8" podUID="47799421-d9fd-4a18-a210-2a5bfacc15c2" Dec 13 14:23:59.374387 env[1211]: time="2024-12-13T14:23:59.374301378Z" level=error msg="StopPodSandbox for \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\" failed" error="failed to destroy network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:59.374955 kubelet[2063]: E1213 14:23:59.374890 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:23:59.375038 kubelet[2063]: E1213 14:23:59.374967 2063 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27"} Dec 13 14:23:59.375038 kubelet[2063]: E1213 14:23:59.375014 2063 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2572bf71-9a1c-40af-ad41-437d084decfc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:59.375154 kubelet[2063]: E1213 14:23:59.375044 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2572bf71-9a1c-40af-ad41-437d084decfc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74f7f4574c-94t6k" podUID="2572bf71-9a1c-40af-ad41-437d084decfc" Dec 13 14:23:59.381385 env[1211]: time="2024-12-13T14:23:59.381309234Z" level=error msg="StopPodSandbox for \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\" failed" error="failed to destroy network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:59.381566 kubelet[2063]: E1213 14:23:59.381535 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:23:59.381628 kubelet[2063]: E1213 14:23:59.381573 2063 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c"} Dec 13 14:23:59.381628 kubelet[2063]: E1213 14:23:59.381602 2063 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d0ecf8c-eff9-4e38-bacc-eef2062b0986\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:59.381628 kubelet[2063]: E1213 14:23:59.381624 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d0ecf8c-eff9-4e38-bacc-eef2062b0986\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-hkn7l" podUID="4d0ecf8c-eff9-4e38-bacc-eef2062b0986" Dec 13 14:23:59.386819 env[1211]: time="2024-12-13T14:23:59.386729799Z" level=error msg="StopPodSandbox for \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\" failed" error="failed to destroy network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:23:59.387024 kubelet[2063]: E1213 14:23:59.386991 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:23:59.387077 kubelet[2063]: E1213 14:23:59.387031 2063 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f"} Dec 13 14:23:59.387106 kubelet[2063]: E1213 14:23:59.387072 2063 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:23:59.387172 kubelet[2063]: E1213 14:23:59.387103 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75b975477b-nszs5" podUID="d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707" Dec 13 14:23:59.974841 systemd[1]: Created slice kubepods-besteffort-pod069b8970_9593_418e_89c7_b56afcdca929.slice. Dec 13 14:23:59.976960 env[1211]: time="2024-12-13T14:23:59.976877894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mwrh5,Uid:069b8970-9593-418e-89c7-b56afcdca929,Namespace:calico-system,Attempt:0,}" Dec 13 14:24:00.064648 env[1211]: time="2024-12-13T14:24:00.064563220Z" level=error msg="Failed to destroy network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:00.067230 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d-shm.mount: Deactivated successfully. Dec 13 14:24:00.067590 env[1211]: time="2024-12-13T14:24:00.067491176Z" level=error msg="encountered an error cleaning up failed sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:00.067590 env[1211]: time="2024-12-13T14:24:00.067560987Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mwrh5,Uid:069b8970-9593-418e-89c7-b56afcdca929,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:00.067888 kubelet[2063]: E1213 14:24:00.067829 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:00.067974 kubelet[2063]: E1213 14:24:00.067906 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mwrh5" Dec 13 14:24:00.067974 kubelet[2063]: E1213 14:24:00.067935 2063 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mwrh5" Dec 13 14:24:00.068047 kubelet[2063]: E1213 14:24:00.067990 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mwrh5_calico-system(069b8970-9593-418e-89c7-b56afcdca929)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mwrh5_calico-system(069b8970-9593-418e-89c7-b56afcdca929)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:24:00.310319 kubelet[2063]: I1213 14:24:00.310195 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:00.311038 env[1211]: time="2024-12-13T14:24:00.310990104Z" level=info msg="StopPodSandbox for \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\"" Dec 13 14:24:00.335807 env[1211]: time="2024-12-13T14:24:00.335724302Z" level=error msg="StopPodSandbox for \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\" failed" error="failed to destroy network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:00.336064 kubelet[2063]: E1213 14:24:00.336021 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:00.336117 kubelet[2063]: E1213 14:24:00.336074 2063 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d"} Dec 13 14:24:00.336117 kubelet[2063]: E1213 14:24:00.336107 2063 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"069b8970-9593-418e-89c7-b56afcdca929\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:00.336208 kubelet[2063]: E1213 14:24:00.336134 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"069b8970-9593-418e-89c7-b56afcdca929\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mwrh5" podUID="069b8970-9593-418e-89c7-b56afcdca929" Dec 13 14:24:02.837747 systemd[1]: Started sshd@8-10.0.0.64:22-10.0.0.1:34836.service. Dec 13 14:24:02.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.64:22-10.0.0.1:34836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:02.839872 kernel: kauditd_printk_skb: 45 callbacks suppressed Dec 13 14:24:02.840015 kernel: audit: type=1130 audit(1734099842.836:1015): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.64:22-10.0.0.1:34836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:02.879000 audit[3151]: USER_ACCT pid=3151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:02.881536 sshd[3151]: Accepted publickey for core from 10.0.0.1 port 34836 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:02.884238 sshd[3151]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:02.882000 audit[3151]: CRED_ACQ pid=3151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:02.887945 systemd-logind[1198]: New session 9 of user core. Dec 13 14:24:02.888850 systemd[1]: Started session-9.scope. Dec 13 14:24:02.891152 kernel: audit: type=1101 audit(1734099842.879:1016): pid=3151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:02.891229 kernel: audit: type=1103 audit(1734099842.882:1017): pid=3151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:02.891247 kernel: audit: type=1006 audit(1734099842.882:1018): pid=3151 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 14:24:02.882000 audit[3151]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1ad871b0 a2=3 a3=0 items=0 ppid=1 pid=3151 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:02.899267 kernel: audit: type=1300 audit(1734099842.882:1018): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1ad871b0 a2=3 a3=0 items=0 ppid=1 pid=3151 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:02.899343 kernel: audit: type=1327 audit(1734099842.882:1018): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:02.882000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:02.891000 audit[3151]: USER_START pid=3151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:02.905803 kernel: audit: type=1105 audit(1734099842.891:1019): pid=3151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:02.905943 kernel: audit: type=1103 audit(1734099842.893:1020): pid=3153 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:02.893000 audit[3153]: CRED_ACQ pid=3153 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:03.015624 sshd[3151]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:03.015000 audit[3151]: USER_END pid=3151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:03.017986 systemd[1]: sshd@8-10.0.0.64:22-10.0.0.1:34836.service: Deactivated successfully. Dec 13 14:24:03.018851 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:24:03.019399 systemd-logind[1198]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:24:03.020127 systemd-logind[1198]: Removed session 9. Dec 13 14:24:03.015000 audit[3151]: CRED_DISP pid=3151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:03.026267 kernel: audit: type=1106 audit(1734099843.015:1021): pid=3151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:03.026359 kernel: audit: type=1104 audit(1734099843.015:1022): pid=3151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:03.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.64:22-10.0.0.1:34836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:08.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.64:22-10.0.0.1:35170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:08.021560 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:24:08.021621 kernel: audit: type=1130 audit(1734099848.019:1024): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.64:22-10.0.0.1:35170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:08.020379 systemd[1]: Started sshd@9-10.0.0.64:22-10.0.0.1:35170.service. Dec 13 14:24:08.060000 audit[3165]: USER_ACCT pid=3165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.064000 audit[3165]: CRED_ACQ pid=3165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.066287 sshd[3165]: Accepted publickey for core from 10.0.0.1 port 35170 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:08.066572 kernel: audit: type=1101 audit(1734099848.060:1025): pid=3165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.066626 kernel: audit: type=1103 audit(1734099848.064:1026): pid=3165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.066547 sshd[3165]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:08.070427 systemd-logind[1198]: New session 10 of user core. Dec 13 14:24:08.071162 systemd[1]: Started session-10.scope. Dec 13 14:24:08.078736 kernel: audit: type=1006 audit(1734099848.064:1027): pid=3165 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:24:08.064000 audit[3165]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc091a5fa0 a2=3 a3=0 items=0 ppid=1 pid=3165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:08.091735 kernel: audit: type=1300 audit(1734099848.064:1027): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc091a5fa0 a2=3 a3=0 items=0 ppid=1 pid=3165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:08.091778 kernel: audit: type=1327 audit(1734099848.064:1027): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:08.064000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:08.093090 kernel: audit: type=1105 audit(1734099848.074:1028): pid=3165 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.074000 audit[3165]: USER_START pid=3165 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.097228 kernel: audit: type=1103 audit(1734099848.075:1029): pid=3167 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.075000 audit[3167]: CRED_ACQ pid=3167 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.245581 sshd[3165]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:08.245000 audit[3165]: USER_END pid=3165 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.245000 audit[3165]: CRED_DISP pid=3165 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.254729 kernel: audit: type=1106 audit(1734099848.245:1030): pid=3165 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.254802 kernel: audit: type=1104 audit(1734099848.245:1031): pid=3165 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:08.254978 systemd[1]: sshd@9-10.0.0.64:22-10.0.0.1:35170.service: Deactivated successfully. Dec 13 14:24:08.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.64:22-10.0.0.1:35170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:08.255662 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:24:08.256224 systemd-logind[1198]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:24:08.256948 systemd-logind[1198]: Removed session 10. Dec 13 14:24:08.658906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2068278251.mount: Deactivated successfully. Dec 13 14:24:09.863218 env[1211]: time="2024-12-13T14:24:09.863160494Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:09.886962 env[1211]: time="2024-12-13T14:24:09.886905717Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:09.896254 env[1211]: time="2024-12-13T14:24:09.896174789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:09.905180 env[1211]: time="2024-12-13T14:24:09.905123319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:09.905608 env[1211]: time="2024-12-13T14:24:09.905567693Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:24:09.915033 env[1211]: time="2024-12-13T14:24:09.914992457Z" level=info msg="CreateContainer within sandbox \"9ae949ed6ec40beb822be0b56b4030270b29dce3c3b22ff02442b39ea9fc00a1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:24:09.971245 env[1211]: time="2024-12-13T14:24:09.971173642Z" level=info msg="StopPodSandbox for \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\"" Dec 13 14:24:09.995110 env[1211]: time="2024-12-13T14:24:09.995039933Z" level=error msg="StopPodSandbox for \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\" failed" error="failed to destroy network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:09.995476 kubelet[2063]: E1213 14:24:09.995428 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Dec 13 14:24:09.995801 kubelet[2063]: E1213 14:24:09.995496 2063 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2"} Dec 13 14:24:09.995801 kubelet[2063]: E1213 14:24:09.995544 2063 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b633c2aa-9d15-49a8-9287-88df5df00fe6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:09.995801 kubelet[2063]: E1213 14:24:09.995602 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b633c2aa-9d15-49a8-9287-88df5df00fe6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-t86p8" podUID="b633c2aa-9d15-49a8-9287-88df5df00fe6" Dec 13 14:24:10.041254 env[1211]: time="2024-12-13T14:24:10.041180635Z" level=info msg="CreateContainer within sandbox \"9ae949ed6ec40beb822be0b56b4030270b29dce3c3b22ff02442b39ea9fc00a1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"573a8d6ac4b56db847d3f3db3b07a7b9bae2d4e8808c35e31135c5f0f5e57aa2\"" Dec 13 14:24:10.041878 env[1211]: time="2024-12-13T14:24:10.041853737Z" level=info msg="StartContainer for \"573a8d6ac4b56db847d3f3db3b07a7b9bae2d4e8808c35e31135c5f0f5e57aa2\"" Dec 13 14:24:10.063157 systemd[1]: Started cri-containerd-573a8d6ac4b56db847d3f3db3b07a7b9bae2d4e8808c35e31135c5f0f5e57aa2.scope. Dec 13 14:24:10.076000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.076000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe08523f9f8 items=0 ppid=2501 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:10.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336138643661633462353664623834376433663364623362303761 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit: BPF prog-id=139 op=LOAD Dec 13 14:24:10.077000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b0a78 items=0 ppid=2501 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:10.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336138643661633462353664623834376433663364623362303761 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit: BPF prog-id=140 op=LOAD Dec 13 14:24:10.077000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003b0ac8 items=0 ppid=2501 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:10.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336138643661633462353664623834376433663364623362303761 Dec 13 14:24:10.077000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:24:10.077000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:10.077000 audit: BPF prog-id=141 op=LOAD Dec 13 14:24:10.077000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003b0b58 items=0 ppid=2501 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:10.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336138643661633462353664623834376433663364623362303761 Dec 13 14:24:10.106924 env[1211]: time="2024-12-13T14:24:10.106842633Z" level=info msg="StartContainer for \"573a8d6ac4b56db847d3f3db3b07a7b9bae2d4e8808c35e31135c5f0f5e57aa2\" returns successfully" Dec 13 14:24:10.268747 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:24:10.277662 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:24:10.330135 kubelet[2063]: E1213 14:24:10.330082 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:10.370530 kubelet[2063]: I1213 14:24:10.370459 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-qfkng" podStartSLOduration=0.914633695 podStartE2EDuration="32.37043343s" podCreationTimestamp="2024-12-13 14:23:38 +0000 UTC" firstStartedPulling="2024-12-13 14:23:38.450796508 +0000 UTC m=+23.557795119" lastFinishedPulling="2024-12-13 14:24:09.906596243 +0000 UTC m=+55.013594854" observedRunningTime="2024-12-13 14:24:10.369729128 +0000 UTC m=+55.476727749" watchObservedRunningTime="2024-12-13 14:24:10.37043343 +0000 UTC m=+55.477432041" Dec 13 14:24:11.331691 kubelet[2063]: E1213 14:24:11.331398 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:11.410000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:11.410000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:11.410000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001918700 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:24:11.410000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0010c7c50 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:24:11.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:11.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:11.595000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:11.595000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:11.595000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:11.595000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00edb5890 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:24:11.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:24:11.595000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00ee49300 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:24:11.595000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00f59f1d0 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:24:11.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:24:11.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:24:11.595000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:11.595000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00f26a990 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:24:11.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:24:11.596000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:11.596000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00f59f200 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:24:11.596000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:24:11.600000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:11.600000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00eb65e80 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c603 key=(null) Dec 13 14:24:11.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 14:24:11.813000 audit[3363]: AVC avc: denied { write } for pid=3363 comm="tee" name="fd" dev="proc" ino=23452 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:11.813000 audit[3363]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2ad88a2b a2=241 a3=1b6 items=1 ppid=3337 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.813000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:24:11.813000 audit: PATH item=0 name="/dev/fd/63" inode=24320 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:11.813000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:11.823000 audit[3384]: AVC avc: denied { write } for pid=3384 comm="tee" name="fd" dev="proc" ino=23460 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:11.823000 audit[3384]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffe2d0a2c a2=241 a3=1b6 items=1 ppid=3334 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.823000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:24:11.823000 audit[3387]: AVC avc: denied { write } for pid=3387 comm="tee" name="fd" dev="proc" ino=25843 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:11.823000 audit: PATH item=0 name="/dev/fd/63" inode=25839 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:11.823000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:11.823000 audit[3387]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff46482a2a a2=241 a3=1b6 items=1 ppid=3329 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.823000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:24:11.823000 audit: PATH item=0 name="/dev/fd/63" inode=25840 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:11.823000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:11.825000 audit[3390]: AVC avc: denied { write } for pid=3390 comm="tee" name="fd" dev="proc" ino=25847 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:11.825000 audit[3390]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff515dda2a a2=241 a3=1b6 items=1 ppid=3341 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.825000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:24:11.825000 audit: PATH item=0 name="/dev/fd/63" inode=25215 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:11.825000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:11.842000 audit[3378]: AVC avc: denied { write } for pid=3378 comm="tee" name="fd" dev="proc" ino=25855 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:11.842000 audit[3378]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1f838a2a a2=241 a3=1b6 items=1 ppid=3327 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.842000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:24:11.842000 audit: PATH item=0 name="/dev/fd/63" inode=25211 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:11.842000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:11.849000 audit[3398]: AVC avc: denied { write } for pid=3398 comm="tee" name="fd" dev="proc" ino=24327 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:11.849000 audit[3398]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7de63a1b a2=241 a3=1b6 items=1 ppid=3330 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.849000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:24:11.849000 audit: PATH item=0 name="/dev/fd/63" inode=25222 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:11.849000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:11.857000 audit[3405]: AVC avc: denied { write } for pid=3405 comm="tee" name="fd" dev="proc" ino=23467 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:11.857000 audit[3405]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7edd0a1a a2=241 a3=1b6 items=1 ppid=3333 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.857000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:24:11.857000 audit: PATH item=0 name="/dev/fd/63" inode=25224 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:11.857000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit: BPF prog-id=142 op=LOAD Dec 13 14:24:11.943000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff3b957a40 a2=98 a3=3 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:11.943000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit: BPF prog-id=143 op=LOAD Dec 13 14:24:11.943000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3b957820 a2=74 a3=540051 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:11.943000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:11.943000 audit: BPF prog-id=144 op=LOAD Dec 13 14:24:11.943000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3b957850 a2=94 a3=2 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:11.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:11.943000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:24:11.971228 env[1211]: time="2024-12-13T14:24:11.971179746Z" level=info msg="StopPodSandbox for \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\"" Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit: BPF prog-id=145 op=LOAD Dec 13 14:24:12.098000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3b957710 a2=40 a3=1 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.098000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:24:12.098000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.098000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff3b9577e0 a2=50 a3=7fff3b9578c0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3b957720 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3b957750 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3b957660 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3b957770 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3b957750 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3b957740 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3b957770 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3b957750 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3b957770 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3b957740 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3b9577b0 a2=28 a3=0 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff3b957560 a2=50 a3=1 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit: BPF prog-id=146 op=LOAD Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff3b957560 a2=94 a3=5 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff3b957610 a2=50 a3=1 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.106000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.106000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff3b957730 a2=4 a3=38 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.106000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { confidentiality } for pid=3426 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:12.107000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3b957780 a2=94 a3=6 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.107000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { confidentiality } for pid=3426 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:12.107000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3b956f30 a2=94 a3=83 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.107000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.107000 audit[3426]: AVC avc: denied { confidentiality } for pid=3426 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:12.107000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3b956f30 a2=94 a3=83 items=0 ppid=3328 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.107000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit: BPF prog-id=147 op=LOAD Dec 13 14:24:12.114000 audit[3475]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf1c0dd70 a2=98 a3=1999999999999999 items=0 ppid=3328 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.114000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:24:12.114000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit: BPF prog-id=148 op=LOAD Dec 13 14:24:12.114000 audit[3475]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf1c0dc50 a2=74 a3=ffff items=0 ppid=3328 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.114000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:24:12.114000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.114000 audit: BPF prog-id=149 op=LOAD Dec 13 14:24:12.114000 audit[3475]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf1c0dc90 a2=40 a3=7ffcf1c0de70 items=0 ppid=3328 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.114000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:24:12.115000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:24:12.155511 systemd-networkd[1033]: vxlan.calico: Link UP Dec 13 14:24:12.155520 systemd-networkd[1033]: vxlan.calico: Gained carrier Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit: BPF prog-id=150 op=LOAD Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe57585460 a2=98 a3=ffffffff items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit: BPF prog-id=151 op=LOAD Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe57585270 a2=74 a3=540051 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit: BPF prog-id=152 op=LOAD Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe575852a0 a2=94 a3=2 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe57585170 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe575851a0 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe575850b0 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe575851c0 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe575851a0 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe57585190 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe575851c0 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe575851a0 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe575851c0 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe57585190 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe57585200 a2=28 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.176000 audit: BPF prog-id=153 op=LOAD Dec 13 14:24:12.176000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe57585070 a2=40 a3=0 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.176000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe57585060 a2=50 a3=2800 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.177000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe57585060 a2=50 a3=2800 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.177000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit: BPF prog-id=154 op=LOAD Dec 13 14:24:12.177000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe57584880 a2=94 a3=2 items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.177000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.177000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.177000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe57584980 a2=94 a3=2d items=0 ppid=3328 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.177000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:12.186000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.186000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.186000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.186000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.186000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.186000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.186000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.186000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.186000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.186000 audit: BPF prog-id=156 op=LOAD Dec 13 14:24:12.186000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca8bf6210 a2=98 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.186000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit: BPF prog-id=157 op=LOAD Dec 13 14:24:12.187000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca8bf5ff0 a2=74 a3=540051 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.187000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.187000 audit: BPF prog-id=158 op=LOAD Dec 13 14:24:12.187000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca8bf6020 a2=94 a3=2 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.187000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.067 [INFO][3446] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.067 [INFO][3446] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" iface="eth0" netns="/var/run/netns/cni-da9a1dd0-4246-3fce-8d1d-4406f343b816" Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.067 [INFO][3446] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" iface="eth0" netns="/var/run/netns/cni-da9a1dd0-4246-3fce-8d1d-4406f343b816" Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.068 [INFO][3446] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" iface="eth0" netns="/var/run/netns/cni-da9a1dd0-4246-3fce-8d1d-4406f343b816" Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.068 [INFO][3446] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.068 [INFO][3446] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.215 [INFO][3468] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" HandleID="k8s-pod-network.f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.216 [INFO][3468] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.217 [INFO][3468] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.228 [WARNING][3468] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" HandleID="k8s-pod-network.f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.228 [INFO][3468] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" HandleID="k8s-pod-network.f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.232 [INFO][3468] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:12.240517 env[1211]: 2024-12-13 14:24:12.236 [INFO][3446] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:12.242430 env[1211]: time="2024-12-13T14:24:12.242377165Z" level=info msg="TearDown network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\" successfully" Dec 13 14:24:12.242562 env[1211]: time="2024-12-13T14:24:12.242538638Z" level=info msg="StopPodSandbox for \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\" returns successfully" Dec 13 14:24:12.243370 kubelet[2063]: E1213 14:24:12.242975 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:12.243407 systemd[1]: run-netns-cni\x2dda9a1dd0\x2d4246\x2d3fce\x2d8d1d\x2d4406f343b816.mount: Deactivated successfully. Dec 13 14:24:12.249591 env[1211]: time="2024-12-13T14:24:12.249410410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-hkn7l,Uid:4d0ecf8c-eff9-4e38-bacc-eef2062b0986,Namespace:kube-system,Attempt:1,}" Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit: BPF prog-id=159 op=LOAD Dec 13 14:24:12.303000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca8bf5ee0 a2=40 a3=1 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.303000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.303000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:24:12.303000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.303000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca8bf5fb0 a2=50 a3=7ffca8bf6090 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.303000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.310000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.310000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca8bf5ef0 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.310000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.310000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.310000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca8bf5f20 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.310000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.310000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.310000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca8bf5e30 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.310000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.310000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.310000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca8bf5f40 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.310000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca8bf5f20 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca8bf5f10 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca8bf5f40 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca8bf5f20 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca8bf5f40 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca8bf5f10 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca8bf5f80 a2=28 a3=0 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca8bf5d30 a2=50 a3=1 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit: BPF prog-id=160 op=LOAD Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca8bf5d30 a2=94 a3=5 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca8bf5de0 a2=50 a3=1 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffca8bf5f00 a2=4 a3=38 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { confidentiality } for pid=3506 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca8bf5f50 a2=94 a3=6 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { confidentiality } for pid=3506 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca8bf5700 a2=94 a3=83 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.311000 audit[3506]: AVC avc: denied { confidentiality } for pid=3506 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:12.311000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca8bf5700 a2=94 a3=83 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.312000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.312000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca8bf7140 a2=10 a3=208 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.312000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.312000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca8bf6fe0 a2=10 a3=3 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.312000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.312000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca8bf6f80 a2=10 a3=3 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.312000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:12.312000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca8bf6f80 a2=10 a3=7 items=0 ppid=3328 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.312000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:12.319000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:24:12.883000 audit[3540]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3540 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:12.883000 audit[3540]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff3136a990 a2=0 a3=7fff3136a97c items=0 ppid=3328 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.883000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:12.894000 audit[3539]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3539 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:12.894000 audit[3539]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd14a37e50 a2=0 a3=7ffd14a37e3c items=0 ppid=3328 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.894000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:12.895000 audit[3542]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3542 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:12.895000 audit[3542]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc27f4c360 a2=0 a3=7ffc27f4c34c items=0 ppid=3328 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.895000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:12.898000 audit[3538]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:12.898000 audit[3538]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffee1dc6de0 a2=0 a3=7ffee1dc6dcc items=0 ppid=3328 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:12.898000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:12.970626 env[1211]: time="2024-12-13T14:24:12.970566199Z" level=info msg="StopPodSandbox for \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\"" Dec 13 14:24:12.970882 env[1211]: time="2024-12-13T14:24:12.970566078Z" level=info msg="StopPodSandbox for \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\"" Dec 13 14:24:13.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.64:22-10.0.0.1:35174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.249802 systemd[1]: Started sshd@10-10.0.0.64:22-10.0.0.1:35174.service. Dec 13 14:24:13.251267 kernel: kauditd_printk_skb: 591 callbacks suppressed Dec 13 14:24:13.251405 kernel: audit: type=1130 audit(1734099853.248:1149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.64:22-10.0.0.1:35174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.092 [INFO][3586] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.093 [INFO][3586] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" iface="eth0" netns="/var/run/netns/cni-926dad6f-d51e-07a0-7944-22e1127736e0" Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.093 [INFO][3586] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" iface="eth0" netns="/var/run/netns/cni-926dad6f-d51e-07a0-7944-22e1127736e0" Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.093 [INFO][3586] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" iface="eth0" netns="/var/run/netns/cni-926dad6f-d51e-07a0-7944-22e1127736e0" Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.093 [INFO][3586] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.093 [INFO][3586] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.214 [INFO][3597] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" HandleID="k8s-pod-network.9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.214 [INFO][3597] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.214 [INFO][3597] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.257 [WARNING][3597] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" HandleID="k8s-pod-network.9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.257 [INFO][3597] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" HandleID="k8s-pod-network.9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.273 [INFO][3597] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:13.277705 env[1211]: 2024-12-13 14:24:13.275 [INFO][3586] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:13.280095 systemd[1]: run-netns-cni\x2d926dad6f\x2dd51e\x2d07a0\x2d7944\x2d22e1127736e0.mount: Deactivated successfully. Dec 13 14:24:13.281664 env[1211]: time="2024-12-13T14:24:13.281610060Z" level=info msg="TearDown network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\" successfully" Dec 13 14:24:13.281776 env[1211]: time="2024-12-13T14:24:13.281751156Z" level=info msg="StopPodSandbox for \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\" returns successfully" Dec 13 14:24:13.283697 env[1211]: time="2024-12-13T14:24:13.283638246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74f7f4574c-94t6k,Uid:2572bf71-9a1c-40af-ad41-437d084decfc,Namespace:calico-system,Attempt:1,}" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.092 [INFO][3579] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.092 [INFO][3579] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" iface="eth0" netns="/var/run/netns/cni-340e6160-a78e-da7d-078b-f721cb58738e" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.092 [INFO][3579] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" iface="eth0" netns="/var/run/netns/cni-340e6160-a78e-da7d-078b-f721cb58738e" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.093 [INFO][3579] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" iface="eth0" netns="/var/run/netns/cni-340e6160-a78e-da7d-078b-f721cb58738e" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.093 [INFO][3579] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.093 [INFO][3579] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.226 [INFO][3596] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" HandleID="k8s-pod-network.dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.226 [INFO][3596] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.273 [INFO][3596] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.283 [WARNING][3596] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" HandleID="k8s-pod-network.dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.283 [INFO][3596] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" HandleID="k8s-pod-network.dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.285 [INFO][3596] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:13.289265 env[1211]: 2024-12-13 14:24:13.287 [INFO][3579] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:13.289885 env[1211]: time="2024-12-13T14:24:13.289440111Z" level=info msg="TearDown network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\" successfully" Dec 13 14:24:13.289885 env[1211]: time="2024-12-13T14:24:13.289506685Z" level=info msg="StopPodSandbox for \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\" returns successfully" Dec 13 14:24:13.291602 systemd[1]: run-netns-cni\x2d340e6160\x2da78e\x2dda7d\x2d078b\x2df721cb58738e.mount: Deactivated successfully. Dec 13 14:24:13.292872 env[1211]: time="2024-12-13T14:24:13.292825442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mwrh5,Uid:069b8970-9593-418e-89c7-b56afcdca929,Namespace:calico-system,Attempt:1,}" Dec 13 14:24:13.305000 audit[3612]: USER_ACCT pid=3612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.306696 sshd[3612]: Accepted publickey for core from 10.0.0.1 port 35174 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:13.308694 sshd[3612]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:13.305000 audit[3612]: CRED_ACQ pid=3612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.320806 kernel: audit: type=1101 audit(1734099853.305:1150): pid=3612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.320962 kernel: audit: type=1103 audit(1734099853.305:1151): pid=3612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.320642 systemd-logind[1198]: New session 11 of user core. Dec 13 14:24:13.326362 kernel: audit: type=1006 audit(1734099853.305:1152): pid=3612 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:24:13.326487 kernel: audit: type=1300 audit(1734099853.305:1152): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbaa2abf0 a2=3 a3=0 items=0 ppid=1 pid=3612 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.305000 audit[3612]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbaa2abf0 a2=3 a3=0 items=0 ppid=1 pid=3612 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.321646 systemd[1]: Started session-11.scope. Dec 13 14:24:13.328585 kernel: audit: type=1327 audit(1734099853.305:1152): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:13.305000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:13.323000 audit[3612]: USER_START pid=3612 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.334233 kernel: audit: type=1105 audit(1734099853.323:1153): pid=3612 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.334286 kernel: audit: type=1103 audit(1734099853.327:1154): pid=3614 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.327000 audit[3614]: CRED_ACQ pid=3614 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.477361 sshd[3612]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:13.477000 audit[3612]: USER_END pid=3612 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.479918 systemd[1]: sshd@10-10.0.0.64:22-10.0.0.1:35174.service: Deactivated successfully. Dec 13 14:24:13.481968 systemd[1]: Started sshd@11-10.0.0.64:22-10.0.0.1:35188.service. Dec 13 14:24:13.489201 kernel: audit: type=1106 audit(1734099853.477:1155): pid=3612 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.489372 kernel: audit: type=1104 audit(1734099853.477:1156): pid=3612 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.477000 audit[3612]: CRED_DISP pid=3612 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.485066 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:24:13.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.64:22-10.0.0.1:35174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.64:22-10.0.0.1:35188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.493556 systemd-logind[1198]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:24:13.495069 systemd-logind[1198]: Removed session 11. Dec 13 14:24:13.523000 audit[3686]: USER_ACCT pid=3686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.525609 sshd[3686]: Accepted publickey for core from 10.0.0.1 port 35188 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:13.524000 audit[3686]: CRED_ACQ pid=3686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.524000 audit[3686]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4371ed90 a2=3 a3=0 items=0 ppid=1 pid=3686 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.524000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:13.526646 sshd[3686]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:13.532025 systemd[1]: Started session-12.scope. Dec 13 14:24:13.532552 systemd-logind[1198]: New session 12 of user core. Dec 13 14:24:13.536000 audit[3686]: USER_START pid=3686 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.537000 audit[3697]: CRED_ACQ pid=3697 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.546949 systemd-networkd[1033]: cali27ebbe0a323: Link UP Dec 13 14:24:13.550389 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:24:13.550442 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali27ebbe0a323: link becomes ready Dec 13 14:24:13.550188 systemd-networkd[1033]: cali27ebbe0a323: Gained carrier Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.409 [INFO][3617] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0 coredns-7db6d8ff4d- kube-system 4d0ecf8c-eff9-4e38-bacc-eef2062b0986 883 0 2024-12-13 14:23:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-hkn7l eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali27ebbe0a323 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-hkn7l" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--hkn7l-" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.409 [INFO][3617] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-hkn7l" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.490 [INFO][3662] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" HandleID="k8s-pod-network.b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.503 [INFO][3662] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" HandleID="k8s-pod-network.b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000158b30), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-hkn7l", "timestamp":"2024-12-13 14:24:13.490259479 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.503 [INFO][3662] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.503 [INFO][3662] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.503 [INFO][3662] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.505 [INFO][3662] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" host="localhost" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.509 [INFO][3662] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.515 [INFO][3662] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.518 [INFO][3662] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.521 [INFO][3662] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.522 [INFO][3662] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" host="localhost" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.524 [INFO][3662] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.529 [INFO][3662] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" host="localhost" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.538 [INFO][3662] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" host="localhost" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.538 [INFO][3662] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" host="localhost" Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.538 [INFO][3662] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:13.564506 env[1211]: 2024-12-13 14:24:13.539 [INFO][3662] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" HandleID="k8s-pod-network.b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:13.565307 env[1211]: 2024-12-13 14:24:13.541 [INFO][3617] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-hkn7l" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"4d0ecf8c-eff9-4e38-bacc-eef2062b0986", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-hkn7l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali27ebbe0a323", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:13.565307 env[1211]: 2024-12-13 14:24:13.541 [INFO][3617] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-hkn7l" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:13.565307 env[1211]: 2024-12-13 14:24:13.541 [INFO][3617] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali27ebbe0a323 ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-hkn7l" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:13.565307 env[1211]: 2024-12-13 14:24:13.551 [INFO][3617] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-hkn7l" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:13.565307 env[1211]: 2024-12-13 14:24:13.551 [INFO][3617] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-hkn7l" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"4d0ecf8c-eff9-4e38-bacc-eef2062b0986", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e", Pod:"coredns-7db6d8ff4d-hkn7l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali27ebbe0a323", MAC:"82:19:a0:a9:84:e8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:13.565307 env[1211]: 2024-12-13 14:24:13.562 [INFO][3617] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-hkn7l" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:13.570000 audit[3713]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3713 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:13.570000 audit[3713]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff002633f0 a2=0 a3=7fff002633dc items=0 ppid=3328 pid=3713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.570000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:13.574618 systemd-networkd[1033]: cali1e91ca7f7b5: Link UP Dec 13 14:24:13.576860 systemd-networkd[1033]: cali1e91ca7f7b5: Gained carrier Dec 13 14:24:13.577463 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1e91ca7f7b5: link becomes ready Dec 13 14:24:13.586529 env[1211]: time="2024-12-13T14:24:13.586444531Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:13.586669 env[1211]: time="2024-12-13T14:24:13.586548768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:13.586669 env[1211]: time="2024-12-13T14:24:13.586580037Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.456 [INFO][3636] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--mwrh5-eth0 csi-node-driver- calico-system 069b8970-9593-418e-89c7-b56afcdca929 893 0 2024-12-13 14:23:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-mwrh5 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1e91ca7f7b5 [] []}} ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Namespace="calico-system" Pod="csi-node-driver-mwrh5" WorkloadEndpoint="localhost-k8s-csi--node--driver--mwrh5-" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.456 [INFO][3636] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Namespace="calico-system" Pod="csi-node-driver-mwrh5" WorkloadEndpoint="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.513 [INFO][3678] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" HandleID="k8s-pod-network.51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.524 [INFO][3678] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" HandleID="k8s-pod-network.51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003acca0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-mwrh5", "timestamp":"2024-12-13 14:24:13.51319581 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.524 [INFO][3678] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.538 [INFO][3678] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.538 [INFO][3678] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.543 [INFO][3678] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" host="localhost" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.547 [INFO][3678] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.552 [INFO][3678] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.554 [INFO][3678] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.556 [INFO][3678] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.556 [INFO][3678] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" host="localhost" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.558 [INFO][3678] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.565 [INFO][3678] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" host="localhost" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.570 [INFO][3678] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" host="localhost" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.570 [INFO][3678] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" host="localhost" Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.570 [INFO][3678] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:13.591025 env[1211]: 2024-12-13 14:24:13.570 [INFO][3678] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" HandleID="k8s-pod-network.51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.591842 env[1211]: 2024-12-13 14:24:13.572 [INFO][3636] cni-plugin/k8s.go 386: Populated endpoint ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Namespace="calico-system" Pod="csi-node-driver-mwrh5" WorkloadEndpoint="localhost-k8s-csi--node--driver--mwrh5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mwrh5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"069b8970-9593-418e-89c7-b56afcdca929", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-mwrh5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1e91ca7f7b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:13.591842 env[1211]: 2024-12-13 14:24:13.572 [INFO][3636] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Namespace="calico-system" Pod="csi-node-driver-mwrh5" WorkloadEndpoint="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.591842 env[1211]: 2024-12-13 14:24:13.572 [INFO][3636] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1e91ca7f7b5 ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Namespace="calico-system" Pod="csi-node-driver-mwrh5" WorkloadEndpoint="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.591842 env[1211]: 2024-12-13 14:24:13.575 [INFO][3636] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Namespace="calico-system" Pod="csi-node-driver-mwrh5" WorkloadEndpoint="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.591842 env[1211]: 2024-12-13 14:24:13.576 [INFO][3636] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Namespace="calico-system" Pod="csi-node-driver-mwrh5" WorkloadEndpoint="localhost-k8s-csi--node--driver--mwrh5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mwrh5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"069b8970-9593-418e-89c7-b56afcdca929", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e", Pod:"csi-node-driver-mwrh5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1e91ca7f7b5", MAC:"76:86:18:a5:e3:01", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:13.591842 env[1211]: 2024-12-13 14:24:13.588 [INFO][3636] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e" Namespace="calico-system" Pod="csi-node-driver-mwrh5" WorkloadEndpoint="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:13.592584 env[1211]: time="2024-12-13T14:24:13.588773271Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e pid=3724 runtime=io.containerd.runc.v2 Dec 13 14:24:13.603188 systemd[1]: Started cri-containerd-b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e.scope. Dec 13 14:24:13.605000 audit[3761]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3761 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:13.605000 audit[3761]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff463b6c20 a2=0 a3=7fff463b6c0c items=0 ppid=3328 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.605000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:13.615839 env[1211]: time="2024-12-13T14:24:13.614618810Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:13.615839 env[1211]: time="2024-12-13T14:24:13.614670778Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:13.615839 env[1211]: time="2024-12-13T14:24:13.614707597Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:13.615839 env[1211]: time="2024-12-13T14:24:13.614894367Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e pid=3771 runtime=io.containerd.runc.v2 Dec 13 14:24:13.620027 systemd-networkd[1033]: calibbe317e89bc: Link UP Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.618000 audit: BPF prog-id=161 op=LOAD Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3724 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653966656530306139356566633036643462313332386339323261 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3724 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653966656530306139356566633036643462313332386339323261 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.619000 audit: BPF prog-id=162 op=LOAD Dec 13 14:24:13.619000 audit[3737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002913e0 items=0 ppid=3724 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653966656530306139356566633036643462313332386339323261 Dec 13 14:24:13.620000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.620000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.620000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.620000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.620000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.620000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.620000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.620000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.620000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.620000 audit: BPF prog-id=163 op=LOAD Dec 13 14:24:13.620000 audit[3737]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000291428 items=0 ppid=3724 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653966656530306139356566633036643462313332386339323261 Dec 13 14:24:13.620000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:24:13.620000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.621000 audit: BPF prog-id=164 op=LOAD Dec 13 14:24:13.624350 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibbe317e89bc: link becomes ready Dec 13 14:24:13.621000 audit[3737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000291838 items=0 ppid=3724 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653966656530306139356566633036643462313332386339323261 Dec 13 14:24:13.625703 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:24:13.626156 systemd-networkd[1033]: calibbe317e89bc: Gained carrier Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.467 [INFO][3646] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0 calico-kube-controllers-74f7f4574c- calico-system 2572bf71-9a1c-40af-ad41-437d084decfc 894 0 2024-12-13 14:23:38 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74f7f4574c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-74f7f4574c-94t6k eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calibbe317e89bc [] []}} ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Namespace="calico-system" Pod="calico-kube-controllers-74f7f4574c-94t6k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.467 [INFO][3646] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Namespace="calico-system" Pod="calico-kube-controllers-74f7f4574c-94t6k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.516 [INFO][3680] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" HandleID="k8s-pod-network.5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.524 [INFO][3680] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" HandleID="k8s-pod-network.5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000384f50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-74f7f4574c-94t6k", "timestamp":"2024-12-13 14:24:13.516870284 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.524 [INFO][3680] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.570 [INFO][3680] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.570 [INFO][3680] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.573 [INFO][3680] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" host="localhost" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.579 [INFO][3680] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.584 [INFO][3680] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.590 [INFO][3680] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.592 [INFO][3680] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.592 [INFO][3680] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" host="localhost" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.594 [INFO][3680] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959 Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.600 [INFO][3680] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" host="localhost" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.611 [INFO][3680] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" host="localhost" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.611 [INFO][3680] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" host="localhost" Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.611 [INFO][3680] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:13.641803 env[1211]: 2024-12-13 14:24:13.611 [INFO][3680] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" HandleID="k8s-pod-network.5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.644040 env[1211]: 2024-12-13 14:24:13.614 [INFO][3646] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Namespace="calico-system" Pod="calico-kube-controllers-74f7f4574c-94t6k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0", GenerateName:"calico-kube-controllers-74f7f4574c-", Namespace:"calico-system", SelfLink:"", UID:"2572bf71-9a1c-40af-ad41-437d084decfc", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74f7f4574c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-74f7f4574c-94t6k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibbe317e89bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:13.644040 env[1211]: 2024-12-13 14:24:13.614 [INFO][3646] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Namespace="calico-system" Pod="calico-kube-controllers-74f7f4574c-94t6k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.644040 env[1211]: 2024-12-13 14:24:13.614 [INFO][3646] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibbe317e89bc ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Namespace="calico-system" Pod="calico-kube-controllers-74f7f4574c-94t6k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.644040 env[1211]: 2024-12-13 14:24:13.626 [INFO][3646] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Namespace="calico-system" Pod="calico-kube-controllers-74f7f4574c-94t6k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.644040 env[1211]: 2024-12-13 14:24:13.627 [INFO][3646] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Namespace="calico-system" Pod="calico-kube-controllers-74f7f4574c-94t6k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0", GenerateName:"calico-kube-controllers-74f7f4574c-", Namespace:"calico-system", SelfLink:"", UID:"2572bf71-9a1c-40af-ad41-437d084decfc", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74f7f4574c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959", Pod:"calico-kube-controllers-74f7f4574c-94t6k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibbe317e89bc", MAC:"76:c2:2b:a1:c4:66", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:13.644040 env[1211]: 2024-12-13 14:24:13.637 [INFO][3646] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959" Namespace="calico-system" Pod="calico-kube-controllers-74f7f4574c-94t6k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:13.654571 systemd[1]: Started cri-containerd-51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e.scope. Dec 13 14:24:13.657000 audit[3813]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3813 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:13.657000 audit[3813]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffe98b2c080 a2=0 a3=7ffe98b2c06c items=0 ppid=3328 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.657000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:13.664576 env[1211]: time="2024-12-13T14:24:13.664534747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-hkn7l,Uid:4d0ecf8c-eff9-4e38-bacc-eef2062b0986,Namespace:kube-system,Attempt:1,} returns sandbox id \"b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e\"" Dec 13 14:24:13.666044 kubelet[2063]: E1213 14:24:13.665424 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:13.668404 env[1211]: time="2024-12-13T14:24:13.668323416Z" level=info msg="CreateContainer within sandbox \"b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:24:13.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit: BPF prog-id=165 op=LOAD Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3771 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531646166646566343466333139396138303166653163363231383966 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3771 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531646166646566343466333139396138303166653163363231383966 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit: BPF prog-id=166 op=LOAD Dec 13 14:24:13.668000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030c350 items=0 ppid=3771 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531646166646566343466333139396138303166653163363231383966 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit: BPF prog-id=167 op=LOAD Dec 13 14:24:13.668000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030c398 items=0 ppid=3771 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531646166646566343466333139396138303166653163363231383966 Dec 13 14:24:13.668000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:24:13.668000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.668000 audit: BPF prog-id=168 op=LOAD Dec 13 14:24:13.668000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030c7a8 items=0 ppid=3771 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531646166646566343466333139396138303166653163363231383966 Dec 13 14:24:13.672190 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:24:13.683007 env[1211]: time="2024-12-13T14:24:13.682907206Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:13.683007 env[1211]: time="2024-12-13T14:24:13.682959554Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:13.683007 env[1211]: time="2024-12-13T14:24:13.682973240Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:13.683488 env[1211]: time="2024-12-13T14:24:13.683406853Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959 pid=3836 runtime=io.containerd.runc.v2 Dec 13 14:24:13.690994 env[1211]: time="2024-12-13T14:24:13.690925550Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mwrh5,Uid:069b8970-9593-418e-89c7-b56afcdca929,Namespace:calico-system,Attempt:1,} returns sandbox id \"51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e\"" Dec 13 14:24:13.693530 env[1211]: time="2024-12-13T14:24:13.692832667Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:24:13.702574 systemd[1]: Started cri-containerd-5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959.scope. Dec 13 14:24:13.715687 env[1211]: time="2024-12-13T14:24:13.715635147Z" level=info msg="CreateContainer within sandbox \"b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f472207e69b62e17f74f0635d0a18857e82f6699436fb7b07c0cf65f040fcc27\"" Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.715000 audit: BPF prog-id=169 op=LOAD Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3836 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363137616636376337396565646264643633616638356161313032 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3836 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363137616636376337396565646264643633616638356161313032 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.716000 audit: BPF prog-id=170 op=LOAD Dec 13 14:24:13.716000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c00009d1a0 items=0 ppid=3836 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363137616636376337396565646264643633616638356161313032 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit: BPF prog-id=171 op=LOAD Dec 13 14:24:13.717000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c00009d1e8 items=0 ppid=3836 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363137616636376337396565646264643633616638356161313032 Dec 13 14:24:13.717000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:24:13.717000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.717000 audit: BPF prog-id=172 op=LOAD Dec 13 14:24:13.717000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c00009d5f8 items=0 ppid=3836 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561363137616636376337396565646264643633616638356161313032 Dec 13 14:24:13.722936 env[1211]: time="2024-12-13T14:24:13.716965443Z" level=info msg="StartContainer for \"f472207e69b62e17f74f0635d0a18857e82f6699436fb7b07c0cf65f040fcc27\"" Dec 13 14:24:13.719462 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:24:13.734789 systemd[1]: Started cri-containerd-f472207e69b62e17f74f0635d0a18857e82f6699436fb7b07c0cf65f040fcc27.scope. Dec 13 14:24:13.757157 env[1211]: time="2024-12-13T14:24:13.757086344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74f7f4574c-94t6k,Uid:2572bf71-9a1c-40af-ad41-437d084decfc,Namespace:calico-system,Attempt:1,} returns sandbox id \"5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959\"" Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.760000 audit: BPF prog-id=173 op=LOAD Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3724 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373232303765363962363265313766373466303633356430613138 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3724 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373232303765363962363265313766373466303633356430613138 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit: BPF prog-id=174 op=LOAD Dec 13 14:24:13.761000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f1e40 items=0 ppid=3724 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373232303765363962363265313766373466303633356430613138 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit: BPF prog-id=175 op=LOAD Dec 13 14:24:13.761000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f1e88 items=0 ppid=3724 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373232303765363962363265313766373466303633356430613138 Dec 13 14:24:13.761000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:24:13.761000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:13.761000 audit: BPF prog-id=176 op=LOAD Dec 13 14:24:13.761000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b8298 items=0 ppid=3724 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373232303765363962363265313766373466303633356430613138 Dec 13 14:24:13.769189 sshd[3686]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:13.772362 systemd[1]: Started sshd@12-10.0.0.64:22-10.0.0.1:35196.service. Dec 13 14:24:13.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.64:22-10.0.0.1:35196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.771000 audit[3686]: USER_END pid=3686 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.772000 audit[3686]: CRED_DISP pid=3686 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.774744 systemd[1]: sshd@11-10.0.0.64:22-10.0.0.1:35188.service: Deactivated successfully. Dec 13 14:24:13.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.64:22-10.0.0.1:35188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.775569 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:24:13.776568 systemd-logind[1198]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:24:13.777491 systemd-logind[1198]: Removed session 12. Dec 13 14:24:13.799603 env[1211]: time="2024-12-13T14:24:13.797173201Z" level=info msg="StartContainer for \"f472207e69b62e17f74f0635d0a18857e82f6699436fb7b07c0cf65f040fcc27\" returns successfully" Dec 13 14:24:13.834000 audit[3903]: USER_ACCT pid=3903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.836225 sshd[3903]: Accepted publickey for core from 10.0.0.1 port 35196 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:13.835000 audit[3903]: CRED_ACQ pid=3903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.835000 audit[3903]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2c9ac8b0 a2=3 a3=0 items=0 ppid=1 pid=3903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:13.835000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:13.837586 sshd[3903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:13.843434 systemd-logind[1198]: New session 13 of user core. Dec 13 14:24:13.843998 systemd[1]: Started session-13.scope. Dec 13 14:24:13.847000 audit[3903]: USER_START pid=3903 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.849000 audit[3916]: CRED_ACQ pid=3916 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.923000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:13.923000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:13.923000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c7e360 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:24:13.923000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:13.923000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f16a00 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:24:13.923000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:13.926000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:13.926000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002f16a20 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:24:13.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:13.926000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:13.926000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c002f16a40 a2=fc6 a3=0 items=0 ppid=1786 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c616 key=(null) Dec 13 14:24:13.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:13.958362 sshd[3903]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:13.958000 audit[3903]: USER_END pid=3903 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.958000 audit[3903]: CRED_DISP pid=3903 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:13.961424 systemd[1]: sshd@12-10.0.0.64:22-10.0.0.1:35196.service: Deactivated successfully. Dec 13 14:24:13.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.64:22-10.0.0.1:35196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.962411 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:24:13.963173 systemd-logind[1198]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:24:13.963953 systemd-logind[1198]: Removed session 13. Dec 13 14:24:13.970492 env[1211]: time="2024-12-13T14:24:13.970448433Z" level=info msg="StopPodSandbox for \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\"" Dec 13 14:24:13.970768 env[1211]: time="2024-12-13T14:24:13.970714873Z" level=info msg="StopPodSandbox for \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\"" Dec 13 14:24:14.157613 systemd-networkd[1033]: vxlan.calico: Gained IPv6LL Dec 13 14:24:14.338996 kubelet[2063]: E1213 14:24:14.338961 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.165 [INFO][3960] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.165 [INFO][3960] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" iface="eth0" netns="/var/run/netns/cni-2ffff57c-0667-87d1-edc8-d926dc95d6c4" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.166 [INFO][3960] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" iface="eth0" netns="/var/run/netns/cni-2ffff57c-0667-87d1-edc8-d926dc95d6c4" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.166 [INFO][3960] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" iface="eth0" netns="/var/run/netns/cni-2ffff57c-0667-87d1-edc8-d926dc95d6c4" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.166 [INFO][3960] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.166 [INFO][3960] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.214 [INFO][3976] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" HandleID="k8s-pod-network.44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.214 [INFO][3976] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.214 [INFO][3976] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.368 [WARNING][3976] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" HandleID="k8s-pod-network.44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.369 [INFO][3976] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" HandleID="k8s-pod-network.44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.384 [INFO][3976] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:14.388372 env[1211]: 2024-12-13 14:24:14.386 [INFO][3960] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:14.389346 env[1211]: time="2024-12-13T14:24:14.389284695Z" level=info msg="TearDown network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\" successfully" Dec 13 14:24:14.389346 env[1211]: time="2024-12-13T14:24:14.389343886Z" level=info msg="StopPodSandbox for \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\" returns successfully" Dec 13 14:24:14.390045 env[1211]: time="2024-12-13T14:24:14.390021448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b975477b-nszs5,Uid:d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:24:14.392285 systemd[1]: run-netns-cni\x2d2ffff57c\x2d0667\x2d87d1\x2dedc8\x2dd926dc95d6c4.mount: Deactivated successfully. Dec 13 14:24:14.425970 kubelet[2063]: I1213 14:24:14.425321 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-hkn7l" podStartSLOduration=46.425301244 podStartE2EDuration="46.425301244s" podCreationTimestamp="2024-12-13 14:23:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:24:14.424521772 +0000 UTC m=+59.531520413" watchObservedRunningTime="2024-12-13 14:24:14.425301244 +0000 UTC m=+59.532299855" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.201 [INFO][3961] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.201 [INFO][3961] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" iface="eth0" netns="/var/run/netns/cni-aca4ab89-9cd8-120a-b399-9686bf643c22" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.201 [INFO][3961] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" iface="eth0" netns="/var/run/netns/cni-aca4ab89-9cd8-120a-b399-9686bf643c22" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.201 [INFO][3961] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" iface="eth0" netns="/var/run/netns/cni-aca4ab89-9cd8-120a-b399-9686bf643c22" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.201 [INFO][3961] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.201 [INFO][3961] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.225 [INFO][3982] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" HandleID="k8s-pod-network.f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.225 [INFO][3982] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.384 [INFO][3982] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.424 [WARNING][3982] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" HandleID="k8s-pod-network.f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.424 [INFO][3982] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" HandleID="k8s-pod-network.f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.427 [INFO][3982] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:14.430872 env[1211]: 2024-12-13 14:24:14.429 [INFO][3961] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:14.434634 env[1211]: time="2024-12-13T14:24:14.431221933Z" level=info msg="TearDown network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\" successfully" Dec 13 14:24:14.434634 env[1211]: time="2024-12-13T14:24:14.431260064Z" level=info msg="StopPodSandbox for \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\" returns successfully" Dec 13 14:24:14.434308 systemd[1]: run-netns-cni\x2daca4ab89\x2d9cd8\x2d120a\x2db399\x2d9686bf643c22.mount: Deactivated successfully. Dec 13 14:24:14.435680 env[1211]: time="2024-12-13T14:24:14.435618631Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b975477b-d62c8,Uid:47799421-d9fd-4a18-a210-2a5bfacc15c2,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:24:14.466000 audit[3993]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:14.466000 audit[3993]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd762c58f0 a2=0 a3=7ffd762c58dc items=0 ppid=2268 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:14.476000 audit[3993]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:14.476000 audit[3993]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd762c58f0 a2=0 a3=0 items=0 ppid=2268 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:14.589000 audit[4038]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:14.589000 audit[4038]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd6150b6f0 a2=0 a3=7ffd6150b6dc items=0 ppid=2268 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:14.594000 audit[4038]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:14.594000 audit[4038]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd6150b6f0 a2=0 a3=7ffd6150b6dc items=0 ppid=2268 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.594000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:14.606591 systemd-networkd[1033]: cali27ebbe0a323: Gained IPv6LL Dec 13 14:24:14.614156 systemd-networkd[1033]: calic76e0d3d19d: Link UP Dec 13 14:24:14.617088 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:24:14.617195 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic76e0d3d19d: link becomes ready Dec 13 14:24:14.617391 systemd-networkd[1033]: calic76e0d3d19d: Gained carrier Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.507 [INFO][4005] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0 calico-apiserver-75b975477b- calico-apiserver 47799421-d9fd-4a18-a210-2a5bfacc15c2 931 0 2024-12-13 14:23:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75b975477b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-75b975477b-d62c8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic76e0d3d19d [] []}} ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-d62c8" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--d62c8-" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.507 [INFO][4005] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-d62c8" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.539 [INFO][4023] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" HandleID="k8s-pod-network.446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.548 [INFO][4023] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" HandleID="k8s-pod-network.446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050d60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-75b975477b-d62c8", "timestamp":"2024-12-13 14:24:14.539529513 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.548 [INFO][4023] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.548 [INFO][4023] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.548 [INFO][4023] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.553 [INFO][4023] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" host="localhost" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.557 [INFO][4023] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.590 [INFO][4023] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.592 [INFO][4023] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.595 [INFO][4023] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.595 [INFO][4023] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" host="localhost" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.597 [INFO][4023] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75 Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.602 [INFO][4023] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" host="localhost" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.610 [INFO][4023] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" host="localhost" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.610 [INFO][4023] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" host="localhost" Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.610 [INFO][4023] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:14.629084 env[1211]: 2024-12-13 14:24:14.610 [INFO][4023] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" HandleID="k8s-pod-network.446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.629963 env[1211]: 2024-12-13 14:24:14.612 [INFO][4005] cni-plugin/k8s.go 386: Populated endpoint ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-d62c8" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0", GenerateName:"calico-apiserver-75b975477b-", Namespace:"calico-apiserver", SelfLink:"", UID:"47799421-d9fd-4a18-a210-2a5bfacc15c2", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b975477b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-75b975477b-d62c8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic76e0d3d19d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:14.629963 env[1211]: 2024-12-13 14:24:14.612 [INFO][4005] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-d62c8" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.629963 env[1211]: 2024-12-13 14:24:14.612 [INFO][4005] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic76e0d3d19d ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-d62c8" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.629963 env[1211]: 2024-12-13 14:24:14.616 [INFO][4005] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-d62c8" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.629963 env[1211]: 2024-12-13 14:24:14.616 [INFO][4005] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-d62c8" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0", GenerateName:"calico-apiserver-75b975477b-", Namespace:"calico-apiserver", SelfLink:"", UID:"47799421-d9fd-4a18-a210-2a5bfacc15c2", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b975477b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75", Pod:"calico-apiserver-75b975477b-d62c8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic76e0d3d19d", MAC:"b2:e9:79:cd:7a:18", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:14.629963 env[1211]: 2024-12-13 14:24:14.627 [INFO][4005] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-d62c8" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:14.637000 audit[4054]: NETFILTER_CFG table=filter:108 family=2 entries=52 op=nft_register_chain pid=4054 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:14.637000 audit[4054]: SYSCALL arch=c000003e syscall=46 success=yes exit=27056 a0=3 a1=7ffddba1c280 a2=0 a3=7ffddba1c26c items=0 ppid=3328 pid=4054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.637000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:14.643222 env[1211]: time="2024-12-13T14:24:14.643139541Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:14.643425 env[1211]: time="2024-12-13T14:24:14.643192110Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:14.643425 env[1211]: time="2024-12-13T14:24:14.643207168Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:14.643531 env[1211]: time="2024-12-13T14:24:14.643437029Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75 pid=4063 runtime=io.containerd.runc.v2 Dec 13 14:24:14.659908 systemd[1]: Started cri-containerd-446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75.scope. Dec 13 14:24:14.671886 systemd-networkd[1033]: calif959b1e22bb: Link UP Dec 13 14:24:14.673847 systemd-networkd[1033]: calif959b1e22bb: Gained carrier Dec 13 14:24:14.674360 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif959b1e22bb: link becomes ready Dec 13 14:24:14.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.675000 audit: BPF prog-id=177 op=LOAD Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366135356430616437366563333237646633666161373366343734 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366135356430616437366563333237646633666161373366343734 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.678000 audit: BPF prog-id=178 op=LOAD Dec 13 14:24:14.678000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003de830 items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366135356430616437366563333237646633666161373366343734 Dec 13 14:24:14.679000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.679000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.679000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.679000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.679000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.679000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.679000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.679000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.679000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.679000 audit: BPF prog-id=179 op=LOAD Dec 13 14:24:14.679000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003de878 items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366135356430616437366563333237646633666161373366343734 Dec 13 14:24:14.679000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:24:14.680000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.680000 audit: BPF prog-id=180 op=LOAD Dec 13 14:24:14.680000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dec88 items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366135356430616437366563333237646633666161373366343734 Dec 13 14:24:14.685136 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.513 [INFO][3995] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0 calico-apiserver-75b975477b- calico-apiserver d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707 930 0 2024-12-13 14:23:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75b975477b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-75b975477b-nszs5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif959b1e22bb [] []}} ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-nszs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--nszs5-" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.513 [INFO][3995] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-nszs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.548 [INFO][4028] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" HandleID="k8s-pod-network.ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.556 [INFO][4028] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" HandleID="k8s-pod-network.ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309570), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-75b975477b-nszs5", "timestamp":"2024-12-13 14:24:14.548155305 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.556 [INFO][4028] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.610 [INFO][4028] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.610 [INFO][4028] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.613 [INFO][4028] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" host="localhost" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.629 [INFO][4028] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.644 [INFO][4028] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.646 [INFO][4028] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.649 [INFO][4028] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.649 [INFO][4028] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" host="localhost" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.650 [INFO][4028] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82 Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.655 [INFO][4028] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" host="localhost" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.665 [INFO][4028] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" host="localhost" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.665 [INFO][4028] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" host="localhost" Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.665 [INFO][4028] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:14.686639 env[1211]: 2024-12-13 14:24:14.665 [INFO][4028] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" HandleID="k8s-pod-network.ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.687923 env[1211]: 2024-12-13 14:24:14.668 [INFO][3995] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-nszs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0", GenerateName:"calico-apiserver-75b975477b-", Namespace:"calico-apiserver", SelfLink:"", UID:"d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b975477b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-75b975477b-nszs5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif959b1e22bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:14.687923 env[1211]: 2024-12-13 14:24:14.668 [INFO][3995] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-nszs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.687923 env[1211]: 2024-12-13 14:24:14.668 [INFO][3995] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif959b1e22bb ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-nszs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.687923 env[1211]: 2024-12-13 14:24:14.674 [INFO][3995] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-nszs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.687923 env[1211]: 2024-12-13 14:24:14.674 [INFO][3995] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-nszs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0", GenerateName:"calico-apiserver-75b975477b-", Namespace:"calico-apiserver", SelfLink:"", UID:"d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b975477b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82", Pod:"calico-apiserver-75b975477b-nszs5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif959b1e22bb", MAC:"fa:dd:5d:b4:78:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:14.687923 env[1211]: 2024-12-13 14:24:14.684 [INFO][3995] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82" Namespace="calico-apiserver" Pod="calico-apiserver-75b975477b-nszs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:14.693000 audit[4102]: NETFILTER_CFG table=filter:109 family=2 entries=46 op=nft_register_chain pid=4102 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:14.693000 audit[4102]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffce2636eb0 a2=0 a3=7ffce2636e9c items=0 ppid=3328 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.693000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:14.706976 env[1211]: time="2024-12-13T14:24:14.706894900Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:14.706976 env[1211]: time="2024-12-13T14:24:14.706934034Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:14.706976 env[1211]: time="2024-12-13T14:24:14.706944093Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:14.707293 env[1211]: time="2024-12-13T14:24:14.707253483Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82 pid=4118 runtime=io.containerd.runc.v2 Dec 13 14:24:14.708640 env[1211]: time="2024-12-13T14:24:14.708597885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b975477b-d62c8,Uid:47799421-d9fd-4a18-a210-2a5bfacc15c2,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75\"" Dec 13 14:24:14.720211 systemd[1]: Started cri-containerd-ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82.scope. Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit: BPF prog-id=181 op=LOAD Dec 13 14:24:14.730000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.730000 audit[4129]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4118 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353835393662363965333466663466313366356166656236633937 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4118 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353835393662363965333466663466313366356166656236633937 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.731000 audit: BPF prog-id=182 op=LOAD Dec 13 14:24:14.731000 audit[4129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00025dce0 items=0 ppid=4118 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353835393662363965333466663466313366356166656236633937 Dec 13 14:24:14.732000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.732000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.732000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.732000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.732000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.732000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.732000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.732000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.732000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.732000 audit: BPF prog-id=183 op=LOAD Dec 13 14:24:14.732000 audit[4129]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00025dd28 items=0 ppid=4118 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353835393662363965333466663466313366356166656236633937 Dec 13 14:24:14.732000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:24:14.733000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:14.733000 audit: BPF prog-id=184 op=LOAD Dec 13 14:24:14.733000 audit[4129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000362138 items=0 ppid=4118 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:14.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353835393662363965333466663466313366356166656236633937 Dec 13 14:24:14.735867 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:24:14.758721 env[1211]: time="2024-12-13T14:24:14.757646693Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b975477b-nszs5,Uid:d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82\"" Dec 13 14:24:14.967938 env[1211]: time="2024-12-13T14:24:14.967809852Z" level=info msg="StopPodSandbox for \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\"" Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.002 [WARNING][4169] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0", GenerateName:"calico-apiserver-75b975477b-", Namespace:"calico-apiserver", SelfLink:"", UID:"47799421-d9fd-4a18-a210-2a5bfacc15c2", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b975477b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75", Pod:"calico-apiserver-75b975477b-d62c8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic76e0d3d19d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.002 [INFO][4169] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.002 [INFO][4169] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" iface="eth0" netns="" Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.002 [INFO][4169] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.002 [INFO][4169] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.026 [INFO][4178] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" HandleID="k8s-pod-network.f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.026 [INFO][4178] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.026 [INFO][4178] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.031 [WARNING][4178] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" HandleID="k8s-pod-network.f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.032 [INFO][4178] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" HandleID="k8s-pod-network.f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.033 [INFO][4178] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:15.036748 env[1211]: 2024-12-13 14:24:15.034 [INFO][4169] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:15.037252 env[1211]: time="2024-12-13T14:24:15.036767729Z" level=info msg="TearDown network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\" successfully" Dec 13 14:24:15.037252 env[1211]: time="2024-12-13T14:24:15.036797896Z" level=info msg="StopPodSandbox for \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\" returns successfully" Dec 13 14:24:15.037507 env[1211]: time="2024-12-13T14:24:15.037456381Z" level=info msg="RemovePodSandbox for \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\"" Dec 13 14:24:15.037556 env[1211]: time="2024-12-13T14:24:15.037498910Z" level=info msg="Forcibly stopping sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\"" Dec 13 14:24:15.056070 systemd-networkd[1033]: cali1e91ca7f7b5: Gained IPv6LL Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.071 [WARNING][4201] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0", GenerateName:"calico-apiserver-75b975477b-", Namespace:"calico-apiserver", SelfLink:"", UID:"47799421-d9fd-4a18-a210-2a5bfacc15c2", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b975477b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75", Pod:"calico-apiserver-75b975477b-d62c8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic76e0d3d19d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.071 [INFO][4201] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.071 [INFO][4201] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" iface="eth0" netns="" Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.071 [INFO][4201] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.071 [INFO][4201] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.090 [INFO][4209] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" HandleID="k8s-pod-network.f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.090 [INFO][4209] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.090 [INFO][4209] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.096 [WARNING][4209] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" HandleID="k8s-pod-network.f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.096 [INFO][4209] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" HandleID="k8s-pod-network.f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Workload="localhost-k8s-calico--apiserver--75b975477b--d62c8-eth0" Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.097 [INFO][4209] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:15.100825 env[1211]: 2024-12-13 14:24:15.099 [INFO][4201] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9" Dec 13 14:24:15.101288 env[1211]: time="2024-12-13T14:24:15.100849878Z" level=info msg="TearDown network for sandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\" successfully" Dec 13 14:24:15.106962 env[1211]: time="2024-12-13T14:24:15.106908965Z" level=info msg="RemovePodSandbox \"f61b4d4433ba76f8bd59de60bafc5d185af8e193ea1a69ccf5d218e98c66ecc9\" returns successfully" Dec 13 14:24:15.107652 env[1211]: time="2024-12-13T14:24:15.107608006Z" level=info msg="StopPodSandbox for \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\"" Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.144 [WARNING][4232] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"4d0ecf8c-eff9-4e38-bacc-eef2062b0986", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e", Pod:"coredns-7db6d8ff4d-hkn7l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali27ebbe0a323", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.144 [INFO][4232] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.144 [INFO][4232] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" iface="eth0" netns="" Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.144 [INFO][4232] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.144 [INFO][4232] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.172 [INFO][4239] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" HandleID="k8s-pod-network.f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.172 [INFO][4239] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.173 [INFO][4239] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.179 [WARNING][4239] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" HandleID="k8s-pod-network.f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.179 [INFO][4239] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" HandleID="k8s-pod-network.f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.181 [INFO][4239] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:15.184718 env[1211]: 2024-12-13 14:24:15.182 [INFO][4232] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:15.185400 env[1211]: time="2024-12-13T14:24:15.184727704Z" level=info msg="TearDown network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\" successfully" Dec 13 14:24:15.185400 env[1211]: time="2024-12-13T14:24:15.184769342Z" level=info msg="StopPodSandbox for \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\" returns successfully" Dec 13 14:24:15.185566 env[1211]: time="2024-12-13T14:24:15.185524478Z" level=info msg="RemovePodSandbox for \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\"" Dec 13 14:24:15.185639 env[1211]: time="2024-12-13T14:24:15.185573039Z" level=info msg="Forcibly stopping sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\"" Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.252 [WARNING][4262] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"4d0ecf8c-eff9-4e38-bacc-eef2062b0986", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b4e9fee00a95efc06d4b1328c922ac980350f6fa79ee940a8773f91d9e4c0e8e", Pod:"coredns-7db6d8ff4d-hkn7l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali27ebbe0a323", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.252 [INFO][4262] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.252 [INFO][4262] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" iface="eth0" netns="" Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.252 [INFO][4262] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.252 [INFO][4262] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.303 [INFO][4269] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" HandleID="k8s-pod-network.f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.303 [INFO][4269] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.303 [INFO][4269] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.308 [WARNING][4269] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" HandleID="k8s-pod-network.f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.309 [INFO][4269] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" HandleID="k8s-pod-network.f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Workload="localhost-k8s-coredns--7db6d8ff4d--hkn7l-eth0" Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.314 [INFO][4269] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:15.319455 env[1211]: 2024-12-13 14:24:15.316 [INFO][4262] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c" Dec 13 14:24:15.319455 env[1211]: time="2024-12-13T14:24:15.318717791Z" level=info msg="TearDown network for sandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\" successfully" Dec 13 14:24:15.346314 kubelet[2063]: E1213 14:24:15.346271 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:15.349567 env[1211]: time="2024-12-13T14:24:15.349494668Z" level=info msg="RemovePodSandbox \"f9fd5d5fff1123e01767faf3f16bbe955116b5ce8fdf3a47cd38fec4102b9e0c\" returns successfully" Dec 13 14:24:15.350179 env[1211]: time="2024-12-13T14:24:15.350115544Z" level=info msg="StopPodSandbox for \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\"" Dec 13 14:24:15.373547 systemd-networkd[1033]: calibbe317e89bc: Gained IPv6LL Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.389 [WARNING][4292] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0", GenerateName:"calico-kube-controllers-74f7f4574c-", Namespace:"calico-system", SelfLink:"", UID:"2572bf71-9a1c-40af-ad41-437d084decfc", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74f7f4574c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959", Pod:"calico-kube-controllers-74f7f4574c-94t6k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibbe317e89bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.390 [INFO][4292] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.390 [INFO][4292] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" iface="eth0" netns="" Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.390 [INFO][4292] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.390 [INFO][4292] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.410 [INFO][4299] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" HandleID="k8s-pod-network.9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.410 [INFO][4299] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.410 [INFO][4299] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.427 [WARNING][4299] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" HandleID="k8s-pod-network.9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.427 [INFO][4299] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" HandleID="k8s-pod-network.9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.429 [INFO][4299] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:15.432573 env[1211]: 2024-12-13 14:24:15.430 [INFO][4292] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:15.433699 env[1211]: time="2024-12-13T14:24:15.432599535Z" level=info msg="TearDown network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\" successfully" Dec 13 14:24:15.433699 env[1211]: time="2024-12-13T14:24:15.432632036Z" level=info msg="StopPodSandbox for \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\" returns successfully" Dec 13 14:24:15.433699 env[1211]: time="2024-12-13T14:24:15.433304016Z" level=info msg="RemovePodSandbox for \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\"" Dec 13 14:24:15.433699 env[1211]: time="2024-12-13T14:24:15.433362475Z" level=info msg="Forcibly stopping sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\"" Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.485 [WARNING][4322] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0", GenerateName:"calico-kube-controllers-74f7f4574c-", Namespace:"calico-system", SelfLink:"", UID:"2572bf71-9a1c-40af-ad41-437d084decfc", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74f7f4574c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959", Pod:"calico-kube-controllers-74f7f4574c-94t6k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibbe317e89bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.485 [INFO][4322] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.485 [INFO][4322] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" iface="eth0" netns="" Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.485 [INFO][4322] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.485 [INFO][4322] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.516 [INFO][4329] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" HandleID="k8s-pod-network.9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.516 [INFO][4329] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.516 [INFO][4329] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.522 [WARNING][4329] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" HandleID="k8s-pod-network.9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.522 [INFO][4329] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" HandleID="k8s-pod-network.9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Workload="localhost-k8s-calico--kube--controllers--74f7f4574c--94t6k-eth0" Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.524 [INFO][4329] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:15.527822 env[1211]: 2024-12-13 14:24:15.526 [INFO][4322] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27" Dec 13 14:24:15.528411 env[1211]: time="2024-12-13T14:24:15.527841639Z" level=info msg="TearDown network for sandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\" successfully" Dec 13 14:24:15.599569 env[1211]: time="2024-12-13T14:24:15.599477570Z" level=info msg="RemovePodSandbox \"9795e5cd58bbca4b9d4bb6092577aea6bdbd0c966a712b9859c0d1424b69ee27\" returns successfully" Dec 13 14:24:15.600077 env[1211]: time="2024-12-13T14:24:15.600034845Z" level=info msg="StopPodSandbox for \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\"" Dec 13 14:24:15.605128 env[1211]: time="2024-12-13T14:24:15.605073929Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:15.608208 env[1211]: time="2024-12-13T14:24:15.608153937Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:15.609964 env[1211]: time="2024-12-13T14:24:15.609920261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:15.611901 env[1211]: time="2024-12-13T14:24:15.611873365Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:15.612458 env[1211]: time="2024-12-13T14:24:15.612412506Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:24:15.614580 env[1211]: time="2024-12-13T14:24:15.614508118Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:24:15.615609 env[1211]: time="2024-12-13T14:24:15.615482986Z" level=info msg="CreateContainer within sandbox \"51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:24:15.646113 env[1211]: time="2024-12-13T14:24:15.646059137Z" level=info msg="CreateContainer within sandbox \"51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d0eb11673b291c6dd6c4a3c31b5348dc269fb215324e898d900e8658201afa31\"" Dec 13 14:24:15.647053 env[1211]: time="2024-12-13T14:24:15.647035620Z" level=info msg="StartContainer for \"d0eb11673b291c6dd6c4a3c31b5348dc269fb215324e898d900e8658201afa31\"" Dec 13 14:24:15.683624 systemd[1]: Started cri-containerd-d0eb11673b291c6dd6c4a3c31b5348dc269fb215324e898d900e8658201afa31.scope. Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7276b37d48 items=0 ppid=3771 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430656231313637336232393163366464366334613363333162353334 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.702000 audit: BPF prog-id=185 op=LOAD Dec 13 14:24:15.702000 audit[4375]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b5338 items=0 ppid=3771 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430656231313637336232393163366464366334613363333162353334 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit: BPF prog-id=186 op=LOAD Dec 13 14:24:15.703000 audit[4375]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b5388 items=0 ppid=3771 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430656231313637336232393163366464366334613363333162353334 Dec 13 14:24:15.703000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:24:15.703000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.703000 audit: BPF prog-id=187 op=LOAD Dec 13 14:24:15.703000 audit[4375]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b5418 items=0 ppid=3771 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430656231313637336232393163366464366334613363333162353334 Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.643 [WARNING][4353] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0", GenerateName:"calico-apiserver-75b975477b-", Namespace:"calico-apiserver", SelfLink:"", UID:"d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b975477b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82", Pod:"calico-apiserver-75b975477b-nszs5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif959b1e22bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.643 [INFO][4353] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.643 [INFO][4353] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" iface="eth0" netns="" Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.643 [INFO][4353] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.644 [INFO][4353] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.694 [INFO][4361] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" HandleID="k8s-pod-network.44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.694 [INFO][4361] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.694 [INFO][4361] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.701 [WARNING][4361] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" HandleID="k8s-pod-network.44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.701 [INFO][4361] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" HandleID="k8s-pod-network.44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.703 [INFO][4361] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:15.715738 env[1211]: 2024-12-13 14:24:15.706 [INFO][4353] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:15.715738 env[1211]: time="2024-12-13T14:24:15.707888250Z" level=info msg="TearDown network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\" successfully" Dec 13 14:24:15.715738 env[1211]: time="2024-12-13T14:24:15.707930108Z" level=info msg="StopPodSandbox for \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\" returns successfully" Dec 13 14:24:15.715738 env[1211]: time="2024-12-13T14:24:15.708621565Z" level=info msg="RemovePodSandbox for \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\"" Dec 13 14:24:15.715738 env[1211]: time="2024-12-13T14:24:15.708664005Z" level=info msg="Forcibly stopping sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\"" Dec 13 14:24:15.757694 systemd-networkd[1033]: calic76e0d3d19d: Gained IPv6LL Dec 13 14:24:15.891159 env[1211]: time="2024-12-13T14:24:15.890997154Z" level=info msg="StartContainer for \"d0eb11673b291c6dd6c4a3c31b5348dc269fb215324e898d900e8658201afa31\" returns successfully" Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.878 [WARNING][4419] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0", GenerateName:"calico-apiserver-75b975477b-", Namespace:"calico-apiserver", SelfLink:"", UID:"d448b4dd-4bbb-4e2d-8ce8-4a5ebfe65707", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b975477b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82", Pod:"calico-apiserver-75b975477b-nszs5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif959b1e22bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.878 [INFO][4419] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.878 [INFO][4419] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" iface="eth0" netns="" Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.878 [INFO][4419] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.878 [INFO][4419] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.901 [INFO][4431] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" HandleID="k8s-pod-network.44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.901 [INFO][4431] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.902 [INFO][4431] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.916 [WARNING][4431] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" HandleID="k8s-pod-network.44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.916 [INFO][4431] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" HandleID="k8s-pod-network.44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Workload="localhost-k8s-calico--apiserver--75b975477b--nszs5-eth0" Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.918 [INFO][4431] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:15.921724 env[1211]: 2024-12-13 14:24:15.920 [INFO][4419] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f" Dec 13 14:24:15.922365 env[1211]: time="2024-12-13T14:24:15.921741442Z" level=info msg="TearDown network for sandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\" successfully" Dec 13 14:24:15.934669 env[1211]: time="2024-12-13T14:24:15.934622737Z" level=info msg="RemovePodSandbox \"44c33c663eda7ce58dd1ac2f93d6af1ee6c8ab5b0c85dddc2e2b332c680fdc9f\" returns successfully" Dec 13 14:24:15.935305 env[1211]: time="2024-12-13T14:24:15.935233582Z" level=info msg="StopPodSandbox for \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\"" Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:15.971 [WARNING][4452] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mwrh5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"069b8970-9593-418e-89c7-b56afcdca929", ResourceVersion:"904", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e", Pod:"csi-node-driver-mwrh5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1e91ca7f7b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:15.972 [INFO][4452] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:15.972 [INFO][4452] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" iface="eth0" netns="" Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:15.972 [INFO][4452] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:15.972 [INFO][4452] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:15.995 [INFO][4459] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" HandleID="k8s-pod-network.dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:15.995 [INFO][4459] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:15.995 [INFO][4459] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:16.001 [WARNING][4459] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" HandleID="k8s-pod-network.dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:16.001 [INFO][4459] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" HandleID="k8s-pod-network.dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:16.002 [INFO][4459] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:16.005441 env[1211]: 2024-12-13 14:24:16.003 [INFO][4452] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:16.006030 env[1211]: time="2024-12-13T14:24:16.005459337Z" level=info msg="TearDown network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\" successfully" Dec 13 14:24:16.006030 env[1211]: time="2024-12-13T14:24:16.005499452Z" level=info msg="StopPodSandbox for \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\" returns successfully" Dec 13 14:24:16.006030 env[1211]: time="2024-12-13T14:24:16.005995032Z" level=info msg="RemovePodSandbox for \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\"" Dec 13 14:24:16.006250 env[1211]: time="2024-12-13T14:24:16.006021261Z" level=info msg="Forcibly stopping sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\"" Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.037 [WARNING][4482] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mwrh5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"069b8970-9593-418e-89c7-b56afcdca929", ResourceVersion:"904", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e", Pod:"csi-node-driver-mwrh5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1e91ca7f7b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.037 [INFO][4482] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.037 [INFO][4482] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" iface="eth0" netns="" Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.037 [INFO][4482] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.038 [INFO][4482] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.059 [INFO][4489] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" HandleID="k8s-pod-network.dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.059 [INFO][4489] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.059 [INFO][4489] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.064 [WARNING][4489] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" HandleID="k8s-pod-network.dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.064 [INFO][4489] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" HandleID="k8s-pod-network.dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Workload="localhost-k8s-csi--node--driver--mwrh5-eth0" Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.065 [INFO][4489] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:16.068240 env[1211]: 2024-12-13 14:24:16.066 [INFO][4482] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d" Dec 13 14:24:16.068794 env[1211]: time="2024-12-13T14:24:16.068259388Z" level=info msg="TearDown network for sandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\" successfully" Dec 13 14:24:16.072069 env[1211]: time="2024-12-13T14:24:16.071992000Z" level=info msg="RemovePodSandbox \"dbf02e7b8155a5025894dbcdaecdffdecf2ccd16c764c3abb2997ab209187b1d\" returns successfully" Dec 13 14:24:16.280631 systemd[1]: run-containerd-runc-k8s.io-d0eb11673b291c6dd6c4a3c31b5348dc269fb215324e898d900e8658201afa31-runc.vGnfjd.mount: Deactivated successfully. Dec 13 14:24:16.349284 kubelet[2063]: E1213 14:24:16.349248 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:16.525621 systemd-networkd[1033]: calif959b1e22bb: Gained IPv6LL Dec 13 14:24:17.692469 kubelet[2063]: E1213 14:24:17.692162 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:18.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.64:22-10.0.0.1:60202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:18.963826 systemd[1]: Started sshd@13-10.0.0.64:22-10.0.0.1:60202.service. Dec 13 14:24:18.992969 kernel: kauditd_printk_skb: 447 callbacks suppressed Dec 13 14:24:18.993100 kernel: audit: type=1130 audit(1734099858.962:1303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.64:22-10.0.0.1:60202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.031000 audit[4526]: USER_ACCT pid=4526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.037232 sshd[4526]: Accepted publickey for core from 10.0.0.1 port 60202 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:19.037519 kernel: audit: type=1101 audit(1734099859.031:1304): pid=4526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.037500 sshd[4526]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:19.035000 audit[4526]: CRED_ACQ pid=4526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.041747 systemd-logind[1198]: New session 14 of user core. Dec 13 14:24:19.041954 systemd[1]: Started session-14.scope. Dec 13 14:24:19.043683 kernel: audit: type=1103 audit(1734099859.035:1305): pid=4526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.043734 kernel: audit: type=1006 audit(1734099859.035:1306): pid=4526 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:24:19.043752 kernel: audit: type=1300 audit(1734099859.035:1306): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6ba89a90 a2=3 a3=0 items=0 ppid=1 pid=4526 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:19.035000 audit[4526]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6ba89a90 a2=3 a3=0 items=0 ppid=1 pid=4526 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:19.035000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:19.052913 kernel: audit: type=1327 audit(1734099859.035:1306): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:19.052963 kernel: audit: type=1105 audit(1734099859.045:1307): pid=4526 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.045000 audit[4526]: USER_START pid=4526 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.047000 audit[4528]: CRED_ACQ pid=4528 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.060531 kernel: audit: type=1103 audit(1734099859.047:1308): pid=4528 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.172681 sshd[4526]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:19.172000 audit[4526]: USER_END pid=4526 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.174805 systemd[1]: sshd@13-10.0.0.64:22-10.0.0.1:60202.service: Deactivated successfully. Dec 13 14:24:19.175447 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:24:19.175887 systemd-logind[1198]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:24:19.176488 systemd-logind[1198]: Removed session 14. Dec 13 14:24:19.172000 audit[4526]: CRED_DISP pid=4526 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.200896 kernel: audit: type=1106 audit(1734099859.172:1309): pid=4526 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.200955 kernel: audit: type=1104 audit(1734099859.172:1310): pid=4526 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:19.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.64:22-10.0.0.1:60202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.917723 env[1211]: time="2024-12-13T14:24:19.917641842Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:19.920444 env[1211]: time="2024-12-13T14:24:19.920396509Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:19.923181 env[1211]: time="2024-12-13T14:24:19.923155353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:19.925553 env[1211]: time="2024-12-13T14:24:19.925522115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:19.926018 env[1211]: time="2024-12-13T14:24:19.925983823Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:24:19.927364 env[1211]: time="2024-12-13T14:24:19.927111541Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:24:19.936597 env[1211]: time="2024-12-13T14:24:19.936546804Z" level=info msg="CreateContainer within sandbox \"5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:24:19.954951 env[1211]: time="2024-12-13T14:24:19.954874156Z" level=info msg="CreateContainer within sandbox \"5a617af67c79eedbdd63af85aa10204f051c2d5a74d6879583e1a0eb917a5959\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"508ed4c1f1f5c0469836244447562aa587176c0a9d67ca5c3647d566f5a824c4\"" Dec 13 14:24:19.955585 env[1211]: time="2024-12-13T14:24:19.955524907Z" level=info msg="StartContainer for \"508ed4c1f1f5c0469836244447562aa587176c0a9d67ca5c3647d566f5a824c4\"" Dec 13 14:24:19.973417 systemd[1]: Started cri-containerd-508ed4c1f1f5c0469836244447562aa587176c0a9d67ca5c3647d566f5a824c4.scope. Dec 13 14:24:19.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit: BPF prog-id=188 op=LOAD Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3836 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:19.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386564346331663166356330343639383336323434343437353632 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3836 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:19.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386564346331663166356330343639383336323434343437353632 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit: BPF prog-id=189 op=LOAD Dec 13 14:24:19.989000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00031d4f0 items=0 ppid=3836 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:19.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386564346331663166356330343639383336323434343437353632 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit: BPF prog-id=190 op=LOAD Dec 13 14:24:19.989000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00031d538 items=0 ppid=3836 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:19.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386564346331663166356330343639383336323434343437353632 Dec 13 14:24:19.989000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:24:19.989000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:19.989000 audit: BPF prog-id=191 op=LOAD Dec 13 14:24:19.989000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00031d948 items=0 ppid=3836 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:19.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386564346331663166356330343639383336323434343437353632 Dec 13 14:24:20.019780 env[1211]: time="2024-12-13T14:24:20.019720535Z" level=info msg="StartContainer for \"508ed4c1f1f5c0469836244447562aa587176c0a9d67ca5c3647d566f5a824c4\" returns successfully" Dec 13 14:24:20.540187 kubelet[2063]: I1213 14:24:20.540106 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74f7f4574c-94t6k" podStartSLOduration=36.373282772 podStartE2EDuration="42.540080714s" podCreationTimestamp="2024-12-13 14:23:38 +0000 UTC" firstStartedPulling="2024-12-13 14:24:13.760097674 +0000 UTC m=+58.867096285" lastFinishedPulling="2024-12-13 14:24:19.926895625 +0000 UTC m=+65.033894227" observedRunningTime="2024-12-13 14:24:20.382990872 +0000 UTC m=+65.489989493" watchObservedRunningTime="2024-12-13 14:24:20.540080714 +0000 UTC m=+65.647079325" Dec 13 14:24:22.971436 env[1211]: time="2024-12-13T14:24:22.970826558Z" level=info msg="StopPodSandbox for \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\"" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.320 [INFO][4616] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.320 [INFO][4616] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" iface="eth0" netns="/var/run/netns/cni-41047168-9a01-716a-e849-a2ffa067a334" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.321 [INFO][4616] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" iface="eth0" netns="/var/run/netns/cni-41047168-9a01-716a-e849-a2ffa067a334" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.321 [INFO][4616] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" iface="eth0" netns="/var/run/netns/cni-41047168-9a01-716a-e849-a2ffa067a334" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.321 [INFO][4616] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.321 [INFO][4616] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.343 [INFO][4623] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" HandleID="k8s-pod-network.f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Workload="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.343 [INFO][4623] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.344 [INFO][4623] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.349 [WARNING][4623] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" HandleID="k8s-pod-network.f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Workload="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.349 [INFO][4623] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" HandleID="k8s-pod-network.f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Workload="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.351 [INFO][4623] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:23.354590 env[1211]: 2024-12-13 14:24:23.352 [INFO][4616] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2" Dec 13 14:24:23.355573 env[1211]: time="2024-12-13T14:24:23.355507111Z" level=info msg="TearDown network for sandbox \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\" successfully" Dec 13 14:24:23.355682 env[1211]: time="2024-12-13T14:24:23.355649635Z" level=info msg="StopPodSandbox for \"f69a1172e42d7bf8f8639b0de20b2cc7d88ec2602ddf16ec7ce2a342e281c3e2\" returns successfully" Dec 13 14:24:23.355976 kubelet[2063]: E1213 14:24:23.355953 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:23.356670 env[1211]: time="2024-12-13T14:24:23.356644343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-t86p8,Uid:b633c2aa-9d15-49a8-9287-88df5df00fe6,Namespace:kube-system,Attempt:1,}" Dec 13 14:24:23.358006 systemd[1]: run-netns-cni\x2d41047168\x2d9a01\x2d716a\x2de849\x2da2ffa067a334.mount: Deactivated successfully. Dec 13 14:24:24.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.64:22-10.0.0.1:60214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:24.177815 systemd[1]: Started sshd@14-10.0.0.64:22-10.0.0.1:60214.service. Dec 13 14:24:24.178974 kernel: kauditd_printk_skb: 58 callbacks suppressed Dec 13 14:24:24.179029 kernel: audit: type=1130 audit(1734099864.176:1330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.64:22-10.0.0.1:60214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:24.247000 audit[4637]: USER_ACCT pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.249359 sshd[4637]: Accepted publickey for core from 10.0.0.1 port 60214 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:24.251786 sshd[4637]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:24.249000 audit[4637]: CRED_ACQ pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.255822 systemd-logind[1198]: New session 15 of user core. Dec 13 14:24:24.256591 systemd[1]: Started session-15.scope. Dec 13 14:24:24.256943 kernel: audit: type=1101 audit(1734099864.247:1331): pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.256997 kernel: audit: type=1103 audit(1734099864.249:1332): pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.257020 kernel: audit: type=1006 audit(1734099864.250:1333): pid=4637 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:24:24.259285 kernel: audit: type=1300 audit(1734099864.250:1333): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc34245170 a2=3 a3=0 items=0 ppid=1 pid=4637 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.250000 audit[4637]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc34245170 a2=3 a3=0 items=0 ppid=1 pid=4637 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.250000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:24.266098 kernel: audit: type=1327 audit(1734099864.250:1333): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:24.266172 kernel: audit: type=1105 audit(1734099864.260:1334): pid=4637 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.260000 audit[4637]: USER_START pid=4637 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.271065 kernel: audit: type=1103 audit(1734099864.261:1335): pid=4639 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.261000 audit[4639]: CRED_ACQ pid=4639 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.380976 sshd[4637]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:24.380000 audit[4637]: USER_END pid=4637 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.382924 systemd[1]: sshd@14-10.0.0.64:22-10.0.0.1:60214.service: Deactivated successfully. Dec 13 14:24:24.383718 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:24:24.384202 systemd-logind[1198]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:24:24.384801 systemd-logind[1198]: Removed session 15. Dec 13 14:24:24.380000 audit[4637]: CRED_DISP pid=4637 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.398268 kernel: audit: type=1106 audit(1734099864.380:1336): pid=4637 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.398349 kernel: audit: type=1104 audit(1734099864.380:1337): pid=4637 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:24.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.64:22-10.0.0.1:60214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:24.454538 env[1211]: time="2024-12-13T14:24:24.454400713Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:24.462467 env[1211]: time="2024-12-13T14:24:24.462411889Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:24.464829 env[1211]: time="2024-12-13T14:24:24.464743939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:24.472152 env[1211]: time="2024-12-13T14:24:24.472105038Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:24.472692 env[1211]: time="2024-12-13T14:24:24.472642158Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:24:24.476095 env[1211]: time="2024-12-13T14:24:24.475927315Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:24:24.477395 env[1211]: time="2024-12-13T14:24:24.477363829Z" level=info msg="CreateContainer within sandbox \"446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:24:24.493851 env[1211]: time="2024-12-13T14:24:24.493770997Z" level=info msg="CreateContainer within sandbox \"446a55d0ad76ec327df3faa73f4742c0d1f9ef4f05d28773d00e870c668b4b75\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f2c63309d8aa0870c320bf032194a18830d23632a4a8bf4104056cc8a74ebe35\"" Dec 13 14:24:24.496201 env[1211]: time="2024-12-13T14:24:24.496084361Z" level=info msg="StartContainer for \"f2c63309d8aa0870c320bf032194a18830d23632a4a8bf4104056cc8a74ebe35\"" Dec 13 14:24:24.521374 systemd[1]: Started cri-containerd-f2c63309d8aa0870c320bf032194a18830d23632a4a8bf4104056cc8a74ebe35.scope. Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.562000 audit: BPF prog-id=192 op=LOAD Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4063 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633633333039643861613038373063333230626630333231393461 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4063 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633633333039643861613038373063333230626630333231393461 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit: BPF prog-id=193 op=LOAD Dec 13 14:24:24.563000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00009b1f0 items=0 ppid=4063 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633633333039643861613038373063333230626630333231393461 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit: BPF prog-id=194 op=LOAD Dec 13 14:24:24.563000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00009b238 items=0 ppid=4063 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633633333039643861613038373063333230626630333231393461 Dec 13 14:24:24.563000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:24:24.563000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.563000 audit: BPF prog-id=195 op=LOAD Dec 13 14:24:24.563000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00009b648 items=0 ppid=4063 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633633333039643861613038373063333230626630333231393461 Dec 13 14:24:24.568902 systemd-networkd[1033]: calidd8c1458730: Link UP Dec 13 14:24:24.572295 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:24:24.572374 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidd8c1458730: link becomes ready Dec 13 14:24:24.572468 systemd-networkd[1033]: calidd8c1458730: Gained carrier Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.471 [INFO][4651] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0 coredns-7db6d8ff4d- kube-system b633c2aa-9d15-49a8-9287-88df5df00fe6 990 0 2024-12-13 14:23:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-t86p8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calidd8c1458730 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t86p8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--t86p8-" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.471 [INFO][4651] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t86p8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.508 [INFO][4665] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" HandleID="k8s-pod-network.79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Workload="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.519 [INFO][4665] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" HandleID="k8s-pod-network.79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Workload="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051670), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-t86p8", "timestamp":"2024-12-13 14:24:24.508262403 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.519 [INFO][4665] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.519 [INFO][4665] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.519 [INFO][4665] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.524 [INFO][4665] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" host="localhost" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.532 [INFO][4665] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.541 [INFO][4665] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.544 [INFO][4665] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.547 [INFO][4665] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.547 [INFO][4665] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" host="localhost" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.548 [INFO][4665] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0 Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.553 [INFO][4665] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" host="localhost" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.561 [INFO][4665] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" host="localhost" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.561 [INFO][4665] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" host="localhost" Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.561 [INFO][4665] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:24.590746 env[1211]: 2024-12-13 14:24:24.561 [INFO][4665] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" HandleID="k8s-pod-network.79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Workload="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:24.591415 env[1211]: 2024-12-13 14:24:24.567 [INFO][4651] cni-plugin/k8s.go 386: Populated endpoint ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t86p8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b633c2aa-9d15-49a8-9287-88df5df00fe6", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-t86p8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidd8c1458730", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:24.591415 env[1211]: 2024-12-13 14:24:24.567 [INFO][4651] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t86p8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:24.591415 env[1211]: 2024-12-13 14:24:24.567 [INFO][4651] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidd8c1458730 ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t86p8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:24.591415 env[1211]: 2024-12-13 14:24:24.573 [INFO][4651] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t86p8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:24.591415 env[1211]: 2024-12-13 14:24:24.573 [INFO][4651] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t86p8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b633c2aa-9d15-49a8-9287-88df5df00fe6", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0", Pod:"coredns-7db6d8ff4d-t86p8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidd8c1458730", MAC:"7e:a3:91:e4:9a:09", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:24.591415 env[1211]: 2024-12-13 14:24:24.587 [INFO][4651] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t86p8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--t86p8-eth0" Dec 13 14:24:24.603000 audit[4721]: NETFILTER_CFG table=filter:110 family=2 entries=46 op=nft_register_chain pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:24.603000 audit[4721]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7ffd574e3150 a2=0 a3=7ffd574e313c items=0 ppid=3328 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.603000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:25.170750 env[1211]: time="2024-12-13T14:24:25.170677793Z" level=info msg="StartContainer for \"f2c63309d8aa0870c320bf032194a18830d23632a4a8bf4104056cc8a74ebe35\" returns successfully" Dec 13 14:24:25.208400 env[1211]: time="2024-12-13T14:24:25.208310775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:25.208400 env[1211]: time="2024-12-13T14:24:25.208365439Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:25.208400 env[1211]: time="2024-12-13T14:24:25.208377161Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:25.208622 env[1211]: time="2024-12-13T14:24:25.208498333Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0 pid=4737 runtime=io.containerd.runc.v2 Dec 13 14:24:25.219973 systemd[1]: Started cri-containerd-79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0.scope. Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit: BPF prog-id=196 op=LOAD Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739656237333631303733633335313135393830336265383664366330 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739656237333631303733633335313135393830336265383664366330 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.235000 audit: BPF prog-id=197 op=LOAD Dec 13 14:24:25.235000 audit[4747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000228520 items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739656237333631303733633335313135393830336265383664366330 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit: BPF prog-id=198 op=LOAD Dec 13 14:24:25.236000 audit[4747]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000228568 items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739656237333631303733633335313135393830336265383664366330 Dec 13 14:24:25.236000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:24:25.236000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.236000 audit: BPF prog-id=199 op=LOAD Dec 13 14:24:25.236000 audit[4747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000228978 items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739656237333631303733633335313135393830336265383664366330 Dec 13 14:24:25.238681 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:24:25.262557 env[1211]: time="2024-12-13T14:24:25.262499630Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-t86p8,Uid:b633c2aa-9d15-49a8-9287-88df5df00fe6,Namespace:kube-system,Attempt:1,} returns sandbox id \"79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0\"" Dec 13 14:24:25.263259 kubelet[2063]: E1213 14:24:25.263235 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:25.265610 env[1211]: time="2024-12-13T14:24:25.265552328Z" level=info msg="CreateContainer within sandbox \"79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:24:25.388972 env[1211]: time="2024-12-13T14:24:25.388515479Z" level=info msg="CreateContainer within sandbox \"79eb7361073c351159803be86d6c0c5273ca84fde1ddd101f875b507fc7e57b0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9b3d2ba116895fbf13308c0f7d052a9b6b64b6261a037dda70ea990a32593214\"" Dec 13 14:24:25.392460 env[1211]: time="2024-12-13T14:24:25.391480017Z" level=info msg="StartContainer for \"9b3d2ba116895fbf13308c0f7d052a9b6b64b6261a037dda70ea990a32593214\"" Dec 13 14:24:25.392573 kubelet[2063]: I1213 14:24:25.390092 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75b975477b-d62c8" podStartSLOduration=38.625688714 podStartE2EDuration="48.3900768s" podCreationTimestamp="2024-12-13 14:23:37 +0000 UTC" firstStartedPulling="2024-12-13 14:24:14.709951595 +0000 UTC m=+59.816950196" lastFinishedPulling="2024-12-13 14:24:24.474339671 +0000 UTC m=+69.581338282" observedRunningTime="2024-12-13 14:24:25.389735776 +0000 UTC m=+70.496734388" watchObservedRunningTime="2024-12-13 14:24:25.3900768 +0000 UTC m=+70.497075411" Dec 13 14:24:25.401393 env[1211]: time="2024-12-13T14:24:25.397580403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:25.404882 env[1211]: time="2024-12-13T14:24:25.404322499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:25.404000 audit[4784]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:25.406023 env[1211]: time="2024-12-13T14:24:25.405913417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:25.404000 audit[4784]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe2dd0c6c0 a2=0 a3=7ffe2dd0c6ac items=0 ppid=2268 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:25.408664 env[1211]: time="2024-12-13T14:24:25.408593571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:25.409164 env[1211]: time="2024-12-13T14:24:25.409125650Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:24:25.409000 audit[4784]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:25.409000 audit[4784]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe2dd0c6c0 a2=0 a3=7ffe2dd0c6ac items=0 ppid=2268 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:25.415060 env[1211]: time="2024-12-13T14:24:25.413886019Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:24:25.415060 env[1211]: time="2024-12-13T14:24:25.414935660Z" level=info msg="CreateContainer within sandbox \"ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:24:25.412227 systemd[1]: Started cri-containerd-9b3d2ba116895fbf13308c0f7d052a9b6b64b6261a037dda70ea990a32593214.scope. Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.431000 audit: BPF prog-id=200 op=LOAD Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4737 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962336432626131313638393566626631333330386330663764303532 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4737 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962336432626131313638393566626631333330386330663764303532 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit: BPF prog-id=201 op=LOAD Dec 13 14:24:25.432000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00032ea70 items=0 ppid=4737 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962336432626131313638393566626631333330386330663764303532 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit: BPF prog-id=202 op=LOAD Dec 13 14:24:25.432000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00032eab8 items=0 ppid=4737 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962336432626131313638393566626631333330386330663764303532 Dec 13 14:24:25.432000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:24:25.432000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.432000 audit: BPF prog-id=203 op=LOAD Dec 13 14:24:25.432000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00032eec8 items=0 ppid=4737 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962336432626131313638393566626631333330386330663764303532 Dec 13 14:24:25.436496 env[1211]: time="2024-12-13T14:24:25.436449362Z" level=info msg="CreateContainer within sandbox \"ce58596b69e34ff4f13f5afeb6c977e7a98c1f01d5b7803775b24c052c047b82\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d4c742e23d756a451c67f31b30d314157ef10e0ebbfae7de989e3123c7bc66ee\"" Dec 13 14:24:25.437485 env[1211]: time="2024-12-13T14:24:25.437431403Z" level=info msg="StartContainer for \"d4c742e23d756a451c67f31b30d314157ef10e0ebbfae7de989e3123c7bc66ee\"" Dec 13 14:24:25.454621 systemd[1]: Started cri-containerd-d4c742e23d756a451c67f31b30d314157ef10e0ebbfae7de989e3123c7bc66ee.scope. Dec 13 14:24:25.464074 env[1211]: time="2024-12-13T14:24:25.464023113Z" level=info msg="StartContainer for \"9b3d2ba116895fbf13308c0f7d052a9b6b64b6261a037dda70ea990a32593214\" returns successfully" Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.472000 audit: BPF prog-id=204 op=LOAD Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4118 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633734326532336437353661343531633637663331623330643331 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4118 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633734326532336437353661343531633637663331623330643331 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit: BPF prog-id=205 op=LOAD Dec 13 14:24:25.473000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000284970 items=0 ppid=4118 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633734326532336437353661343531633637663331623330643331 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit: BPF prog-id=206 op=LOAD Dec 13 14:24:25.473000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002849b8 items=0 ppid=4118 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633734326532336437353661343531633637663331623330643331 Dec 13 14:24:25.473000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:24:25.473000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:25.473000 audit: BPF prog-id=207 op=LOAD Dec 13 14:24:25.473000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000284dc8 items=0 ppid=4118 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434633734326532336437353661343531633637663331623330643331 Dec 13 14:24:25.514994 env[1211]: time="2024-12-13T14:24:25.514930433Z" level=info msg="StartContainer for \"d4c742e23d756a451c67f31b30d314157ef10e0ebbfae7de989e3123c7bc66ee\" returns successfully" Dec 13 14:24:25.872000 audit[4690]: AVC avc: denied { watch } for pid=4690 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_23_58.928012652/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c422 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c315,c422 tclass=file permissive=0 Dec 13 14:24:25.872000 audit[4690]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c216e0 a2=fc6 a3=0 items=0 ppid=4063 pid=4690 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c422 key=(null) Dec 13 14:24:25.872000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:24:26.379710 kubelet[2063]: E1213 14:24:26.379662 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:26.381377 kubelet[2063]: I1213 14:24:26.381193 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:26.394906 kubelet[2063]: I1213 14:24:26.394828 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-t86p8" podStartSLOduration=58.394811207 podStartE2EDuration="58.394811207s" podCreationTimestamp="2024-12-13 14:23:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:24:26.393974115 +0000 UTC m=+71.500972756" watchObservedRunningTime="2024-12-13 14:24:26.394811207 +0000 UTC m=+71.501809808" Dec 13 14:24:26.426000 audit[4852]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:26.426000 audit[4852]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc2286e330 a2=0 a3=7ffc2286e31c items=0 ppid=2268 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:26.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:26.433000 audit[4852]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:26.433000 audit[4852]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc2286e330 a2=0 a3=7ffc2286e31c items=0 ppid=2268 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:26.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:26.439000 audit[4828]: AVC avc: denied { watch } for pid=4828 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_23_58.3036757656/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c280,c498 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c280,c498 tclass=file permissive=0 Dec 13 14:24:26.439000 audit[4828]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0013b10e0 a2=fc6 a3=0 items=0 ppid=4118 pid=4828 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c280,c498 key=(null) Dec 13 14:24:26.439000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:24:26.448000 audit[4854]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:26.448000 audit[4854]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdac1e8a00 a2=0 a3=7ffdac1e89ec items=0 ppid=2268 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:26.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:26.463000 audit[4854]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:26.463000 audit[4854]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdac1e8a00 a2=0 a3=7ffdac1e89ec items=0 ppid=2268 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:26.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:26.509582 systemd-networkd[1033]: calidd8c1458730: Gained IPv6LL Dec 13 14:24:26.970387 env[1211]: time="2024-12-13T14:24:26.970304492Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:26.972725 env[1211]: time="2024-12-13T14:24:26.972676273Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:26.974245 env[1211]: time="2024-12-13T14:24:26.974205331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:26.976140 env[1211]: time="2024-12-13T14:24:26.976111951Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:26.976845 env[1211]: time="2024-12-13T14:24:26.976823874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:24:26.978907 env[1211]: time="2024-12-13T14:24:26.978865863Z" level=info msg="CreateContainer within sandbox \"51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:24:26.994296 env[1211]: time="2024-12-13T14:24:26.994226452Z" level=info msg="CreateContainer within sandbox \"51dafdef44f3199a801fe1c62189f4a99f5707a1c447cbb7e7d1c6944152fe4e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4463c102dc4eec21fac5d6ccad447e38ef3f8fd9120b4044ca9c5c8c0405d5b7\"" Dec 13 14:24:26.995054 env[1211]: time="2024-12-13T14:24:26.995001807Z" level=info msg="StartContainer for \"4463c102dc4eec21fac5d6ccad447e38ef3f8fd9120b4044ca9c5c8c0405d5b7\"" Dec 13 14:24:27.017302 systemd[1]: Started cri-containerd-4463c102dc4eec21fac5d6ccad447e38ef3f8fd9120b4044ca9c5c8c0405d5b7.scope. Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7fda27f23cb8 items=0 ppid=3771 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363363313032646334656563323166616335643663636164343437 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.029000 audit: BPF prog-id=208 op=LOAD Dec 13 14:24:27.029000 audit[4863]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c0001bce98 items=0 ppid=3771 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363363313032646334656563323166616335643663636164343437 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit: BPF prog-id=209 op=LOAD Dec 13 14:24:27.030000 audit[4863]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c0001bcee8 items=0 ppid=3771 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363363313032646334656563323166616335643663636164343437 Dec 13 14:24:27.030000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:24:27.030000 audit: BPF prog-id=208 op=UNLOAD Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.030000 audit: BPF prog-id=210 op=LOAD Dec 13 14:24:27.030000 audit[4863]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c0001bcf78 items=0 ppid=3771 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363363313032646334656563323166616335643663636164343437 Dec 13 14:24:27.184768 env[1211]: time="2024-12-13T14:24:27.184696663Z" level=info msg="StartContainer for \"4463c102dc4eec21fac5d6ccad447e38ef3f8fd9120b4044ca9c5c8c0405d5b7\" returns successfully" Dec 13 14:24:27.375060 systemd[1]: run-containerd-runc-k8s.io-4463c102dc4eec21fac5d6ccad447e38ef3f8fd9120b4044ca9c5c8c0405d5b7-runc.RepRuw.mount: Deactivated successfully. Dec 13 14:24:27.386262 kubelet[2063]: E1213 14:24:27.386218 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:27.399504 kubelet[2063]: I1213 14:24:27.399446 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75b975477b-nszs5" podStartSLOduration=39.74866946 podStartE2EDuration="50.399426847s" podCreationTimestamp="2024-12-13 14:23:37 +0000 UTC" firstStartedPulling="2024-12-13 14:24:14.759479071 +0000 UTC m=+59.866477682" lastFinishedPulling="2024-12-13 14:24:25.410236458 +0000 UTC m=+70.517235069" observedRunningTime="2024-12-13 14:24:26.439033944 +0000 UTC m=+71.546032565" watchObservedRunningTime="2024-12-13 14:24:27.399426847 +0000 UTC m=+72.506425458" Dec 13 14:24:27.409088 kubelet[2063]: I1213 14:24:27.409027 2063 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-mwrh5" podStartSLOduration=36.1240283 podStartE2EDuration="49.409005145s" podCreationTimestamp="2024-12-13 14:23:38 +0000 UTC" firstStartedPulling="2024-12-13 14:24:13.692612885 +0000 UTC m=+58.799611496" lastFinishedPulling="2024-12-13 14:24:26.97758973 +0000 UTC m=+72.084588341" observedRunningTime="2024-12-13 14:24:27.400067874 +0000 UTC m=+72.507066495" watchObservedRunningTime="2024-12-13 14:24:27.409005145 +0000 UTC m=+72.516003756" Dec 13 14:24:27.482000 audit[4894]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:27.482000 audit[4894]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffee59ab40 a2=0 a3=7fffee59ab2c items=0 ppid=2268 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:27.486000 audit[4894]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:27.486000 audit[4894]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffee59ab40 a2=0 a3=7fffee59ab2c items=0 ppid=2268 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:28.056958 kubelet[2063]: I1213 14:24:28.056890 2063 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:24:28.056958 kubelet[2063]: I1213 14:24:28.056932 2063 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:24:28.388673 kubelet[2063]: E1213 14:24:28.388611 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:29.086983 kubelet[2063]: I1213 14:24:29.086908 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:29.143000 audit[4915]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:29.143000 audit[4915]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd8e2dbcd0 a2=0 a3=7ffd8e2dbcbc items=0 ppid=2268 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:29.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:29.149000 audit[4915]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:29.149000 audit[4915]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd8e2dbcd0 a2=0 a3=7ffd8e2dbcbc items=0 ppid=2268 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:29.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:29.386569 systemd[1]: Started sshd@15-10.0.0.64:22-10.0.0.1:53196.service. Dec 13 14:24:29.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.64:22-10.0.0.1:53196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.388278 kernel: kauditd_printk_skb: 311 callbacks suppressed Dec 13 14:24:29.388400 kernel: audit: type=1130 audit(1734099869.386:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.64:22-10.0.0.1:53196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.429000 audit[4917]: USER_ACCT pid=4917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.431639 sshd[4917]: Accepted publickey for core from 10.0.0.1 port 53196 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:29.432573 sshd[4917]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:29.430000 audit[4917]: CRED_ACQ pid=4917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.436882 systemd-logind[1198]: New session 16 of user core. Dec 13 14:24:29.437821 systemd[1]: Started session-16.scope. Dec 13 14:24:29.440314 kernel: audit: type=1101 audit(1734099869.429:1431): pid=4917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.440437 kernel: audit: type=1103 audit(1734099869.430:1432): pid=4917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.440459 kernel: audit: type=1006 audit(1734099869.430:1433): pid=4917 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:24:29.430000 audit[4917]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef174b6d0 a2=3 a3=0 items=0 ppid=1 pid=4917 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:29.448931 kernel: audit: type=1300 audit(1734099869.430:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef174b6d0 a2=3 a3=0 items=0 ppid=1 pid=4917 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:29.449038 kernel: audit: type=1327 audit(1734099869.430:1433): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:29.430000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:29.450730 kernel: audit: type=1105 audit(1734099869.440:1434): pid=4917 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.440000 audit[4917]: USER_START pid=4917 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.443000 audit[4919]: CRED_ACQ pid=4919 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.460237 kernel: audit: type=1103 audit(1734099869.443:1435): pid=4919 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.589430 sshd[4917]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:29.590000 audit[4917]: USER_END pid=4917 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.592049 systemd[1]: sshd@15-10.0.0.64:22-10.0.0.1:53196.service: Deactivated successfully. Dec 13 14:24:29.592753 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:24:29.593343 systemd-logind[1198]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:24:29.594164 systemd-logind[1198]: Removed session 16. Dec 13 14:24:29.590000 audit[4917]: CRED_DISP pid=4917 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.598441 kernel: audit: type=1106 audit(1734099869.590:1436): pid=4917 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.598605 kernel: audit: type=1104 audit(1734099869.590:1437): pid=4917 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:29.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.64:22-10.0.0.1:53196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:34.596262 systemd[1]: Started sshd@16-10.0.0.64:22-10.0.0.1:53202.service. Dec 13 14:24:34.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.64:22-10.0.0.1:53202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:34.597880 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:24:34.597939 kernel: audit: type=1130 audit(1734099874.596:1439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.64:22-10.0.0.1:53202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:34.634000 audit[4941]: USER_ACCT pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.635484 sshd[4941]: Accepted publickey for core from 10.0.0.1 port 53202 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:34.636899 sshd[4941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:34.643945 kernel: audit: type=1101 audit(1734099874.634:1440): pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.647031 kernel: audit: type=1103 audit(1734099874.635:1441): pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.647073 kernel: audit: type=1006 audit(1734099874.635:1442): pid=4941 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:24:34.647089 kernel: audit: type=1300 audit(1734099874.635:1442): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff736e65c0 a2=3 a3=0 items=0 ppid=1 pid=4941 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:34.635000 audit[4941]: CRED_ACQ pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.635000 audit[4941]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff736e65c0 a2=3 a3=0 items=0 ppid=1 pid=4941 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:34.640830 systemd-logind[1198]: New session 17 of user core. Dec 13 14:24:34.641552 systemd[1]: Started session-17.scope. Dec 13 14:24:34.635000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:34.654143 kernel: audit: type=1327 audit(1734099874.635:1442): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:34.654187 kernel: audit: type=1105 audit(1734099874.646:1443): pid=4941 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.646000 audit[4941]: USER_START pid=4941 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.658630 kernel: audit: type=1103 audit(1734099874.646:1444): pid=4945 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.646000 audit[4945]: CRED_ACQ pid=4945 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.749112 sshd[4941]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:34.749000 audit[4941]: USER_END pid=4941 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.751627 systemd[1]: sshd@16-10.0.0.64:22-10.0.0.1:53202.service: Deactivated successfully. Dec 13 14:24:34.752342 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:24:34.749000 audit[4941]: CRED_DISP pid=4941 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.752878 systemd-logind[1198]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:24:34.753683 systemd-logind[1198]: Removed session 17. Dec 13 14:24:34.758371 kernel: audit: type=1106 audit(1734099874.749:1445): pid=4941 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.758577 kernel: audit: type=1104 audit(1734099874.749:1446): pid=4941 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:34.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.64:22-10.0.0.1:53202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:34.970356 kubelet[2063]: E1213 14:24:34.970222 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:39.753900 systemd[1]: Started sshd@17-10.0.0.64:22-10.0.0.1:53782.service. Dec 13 14:24:39.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.64:22-10.0.0.1:53782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:39.755356 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:24:39.755407 kernel: audit: type=1130 audit(1734099879.752:1448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.64:22-10.0.0.1:53782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:39.795000 audit[4958]: USER_ACCT pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.797303 sshd[4958]: Accepted publickey for core from 10.0.0.1 port 53782 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:39.801382 kernel: audit: type=1101 audit(1734099879.795:1449): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.801520 kernel: audit: type=1103 audit(1734099879.799:1450): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.799000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.801663 sshd[4958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:39.805884 systemd-logind[1198]: New session 18 of user core. Dec 13 14:24:39.806645 systemd[1]: Started session-18.scope. Dec 13 14:24:39.807641 kernel: audit: type=1006 audit(1734099879.800:1451): pid=4958 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:24:39.807712 kernel: audit: type=1300 audit(1734099879.800:1451): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef5f9e300 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:39.800000 audit[4958]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef5f9e300 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:39.811661 kernel: audit: type=1327 audit(1734099879.800:1451): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:39.800000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:39.811000 audit[4958]: USER_START pid=4958 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.813357 kernel: audit: type=1105 audit(1734099879.811:1452): pid=4958 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.813000 audit[4960]: CRED_ACQ pid=4960 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.821118 kernel: audit: type=1103 audit(1734099879.813:1453): pid=4960 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.923945 sshd[4958]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:39.934655 kernel: audit: type=1106 audit(1734099879.923:1454): pid=4958 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.934816 kernel: audit: type=1130 audit(1734099879.927:1455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.64:22-10.0.0.1:53792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:39.923000 audit[4958]: USER_END pid=4958 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.64:22-10.0.0.1:53792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:39.928012 systemd[1]: Started sshd@18-10.0.0.64:22-10.0.0.1:53792.service. Dec 13 14:24:39.930820 systemd[1]: sshd@17-10.0.0.64:22-10.0.0.1:53782.service: Deactivated successfully. Dec 13 14:24:39.931680 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:24:39.936298 systemd-logind[1198]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:24:39.927000 audit[4958]: CRED_DISP pid=4958 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.64:22-10.0.0.1:53782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:39.938024 systemd-logind[1198]: Removed session 18. Dec 13 14:24:39.966000 audit[4971]: USER_ACCT pid=4971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.968079 sshd[4971]: Accepted publickey for core from 10.0.0.1 port 53792 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:39.967000 audit[4971]: CRED_ACQ pid=4971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.967000 audit[4971]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc133aa9b0 a2=3 a3=0 items=0 ppid=1 pid=4971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:39.967000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:39.969323 sshd[4971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:39.973971 systemd-logind[1198]: New session 19 of user core. Dec 13 14:24:39.975124 systemd[1]: Started session-19.scope. Dec 13 14:24:39.979000 audit[4971]: USER_START pid=4971 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:39.982000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.544449 sshd[4971]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:40.544000 audit[4971]: USER_END pid=4971 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.544000 audit[4971]: CRED_DISP pid=4971 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.548318 systemd[1]: Started sshd@19-10.0.0.64:22-10.0.0.1:53808.service. Dec 13 14:24:40.549001 systemd[1]: sshd@18-10.0.0.64:22-10.0.0.1:53792.service: Deactivated successfully. Dec 13 14:24:40.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.64:22-10.0.0.1:53808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:40.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.64:22-10.0.0.1:53792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:40.549713 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:24:40.550434 systemd-logind[1198]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:24:40.551367 systemd-logind[1198]: Removed session 19. Dec 13 14:24:40.587000 audit[4983]: USER_ACCT pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.589237 sshd[4983]: Accepted publickey for core from 10.0.0.1 port 53808 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:40.589000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.589000 audit[4983]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea1280aa0 a2=3 a3=0 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:40.589000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:40.590999 sshd[4983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:40.595077 systemd-logind[1198]: New session 20 of user core. Dec 13 14:24:40.596086 systemd[1]: Started session-20.scope. Dec 13 14:24:40.600000 audit[4983]: USER_START pid=4983 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:40.601000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:42.380000 audit[4998]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:42.380000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc3ac09b50 a2=0 a3=7ffc3ac09b3c items=0 ppid=2268 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:42.386000 audit[4998]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:42.386000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc3ac09b50 a2=0 a3=0 items=0 ppid=2268 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:42.440000 audit[5000]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:42.440000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdeab86ab0 a2=0 a3=7ffdeab86a9c items=0 ppid=2268 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:42.446000 audit[5000]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:42.446000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdeab86ab0 a2=0 a3=0 items=0 ppid=2268 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:42.468259 sshd[4983]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:42.468000 audit[4983]: USER_END pid=4983 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:42.468000 audit[4983]: CRED_DISP pid=4983 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:42.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.64:22-10.0.0.1:53822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:42.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.64:22-10.0.0.1:53808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:42.472412 systemd[1]: Started sshd@20-10.0.0.64:22-10.0.0.1:53822.service. Dec 13 14:24:42.473071 systemd[1]: sshd@19-10.0.0.64:22-10.0.0.1:53808.service: Deactivated successfully. Dec 13 14:24:42.473905 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:24:42.475384 systemd-logind[1198]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:24:42.477107 systemd-logind[1198]: Removed session 20. Dec 13 14:24:42.515000 audit[5002]: USER_ACCT pid=5002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:42.517186 sshd[5002]: Accepted publickey for core from 10.0.0.1 port 53822 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:42.516000 audit[5002]: CRED_ACQ pid=5002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:42.516000 audit[5002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc5526660 a2=3 a3=0 items=0 ppid=1 pid=5002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.516000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:42.518016 sshd[5002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:42.521784 systemd-logind[1198]: New session 21 of user core. Dec 13 14:24:42.522549 systemd[1]: Started session-21.scope. Dec 13 14:24:42.525000 audit[5002]: USER_START pid=5002 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:42.526000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:42.970298 kubelet[2063]: E1213 14:24:42.970257 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:43.075431 sshd[5002]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:43.079258 systemd[1]: sshd@20-10.0.0.64:22-10.0.0.1:53822.service: Deactivated successfully. Dec 13 14:24:43.076000 audit[5002]: USER_END pid=5002 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:43.076000 audit[5002]: CRED_DISP pid=5002 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:43.081141 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:24:43.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.64:22-10.0.0.1:53822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.081876 systemd-logind[1198]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:24:43.083201 systemd[1]: Started sshd@21-10.0.0.64:22-10.0.0.1:53830.service. Dec 13 14:24:43.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.64:22-10.0.0.1:53830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.084208 systemd-logind[1198]: Removed session 21. Dec 13 14:24:43.120000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:43.122094 sshd[5015]: Accepted publickey for core from 10.0.0.1 port 53830 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:43.121000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:43.121000 audit[5015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4df97230 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.121000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:43.126808 systemd-logind[1198]: New session 22 of user core. Dec 13 14:24:43.123217 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:43.127700 systemd[1]: Started session-22.scope. Dec 13 14:24:43.130000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:43.132000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:43.241391 sshd[5015]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:43.241000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:43.241000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:43.244837 systemd[1]: sshd@21-10.0.0.64:22-10.0.0.1:53830.service: Deactivated successfully. Dec 13 14:24:43.245682 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:24:43.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.64:22-10.0.0.1:53830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.246680 systemd-logind[1198]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:24:43.247444 systemd-logind[1198]: Removed session 22. Dec 13 14:24:44.971361 kubelet[2063]: E1213 14:24:44.971292 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:48.245817 systemd[1]: Started sshd@22-10.0.0.64:22-10.0.0.1:33020.service. Dec 13 14:24:48.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.64:22-10.0.0.1:33020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:48.247423 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 14:24:48.247498 kernel: audit: type=1130 audit(1734099888.244:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.64:22-10.0.0.1:33020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:48.286000 audit[5055]: USER_ACCT pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.287862 sshd[5055]: Accepted publickey for core from 10.0.0.1 port 33020 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:48.289736 sshd[5055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:48.288000 audit[5055]: CRED_ACQ pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.293394 systemd-logind[1198]: New session 23 of user core. Dec 13 14:24:48.293707 systemd[1]: Started session-23.scope. Dec 13 14:24:48.298679 kernel: audit: type=1101 audit(1734099888.286:1498): pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.298744 kernel: audit: type=1103 audit(1734099888.288:1499): pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.298899 kernel: audit: type=1006 audit(1734099888.288:1500): pid=5055 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:24:48.301913 kernel: audit: type=1300 audit(1734099888.288:1500): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee97df950 a2=3 a3=0 items=0 ppid=1 pid=5055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:48.288000 audit[5055]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee97df950 a2=3 a3=0 items=0 ppid=1 pid=5055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:48.288000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:48.309426 kernel: audit: type=1327 audit(1734099888.288:1500): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:48.309480 kernel: audit: type=1105 audit(1734099888.296:1501): pid=5055 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.296000 audit[5055]: USER_START pid=5055 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.297000 audit[5057]: CRED_ACQ pid=5057 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.319555 kernel: audit: type=1103 audit(1734099888.297:1502): pid=5057 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.416200 sshd[5055]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:48.415000 audit[5055]: USER_END pid=5055 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.418462 systemd[1]: sshd@22-10.0.0.64:22-10.0.0.1:33020.service: Deactivated successfully. Dec 13 14:24:48.419306 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:24:48.420067 systemd-logind[1198]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:24:48.420735 systemd-logind[1198]: Removed session 23. Dec 13 14:24:48.415000 audit[5055]: CRED_DISP pid=5055 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.425198 kernel: audit: type=1106 audit(1734099888.415:1503): pid=5055 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.425266 kernel: audit: type=1104 audit(1734099888.415:1504): pid=5055 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:48.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.64:22-10.0.0.1:33020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:50.566000 audit[5068]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5068 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:50.566000 audit[5068]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc4287dad0 a2=0 a3=7ffc4287dabc items=0 ppid=2268 pid=5068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:50.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:50.571000 audit[5068]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5068 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:50.571000 audit[5068]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc4287dad0 a2=0 a3=7ffc4287dabc items=0 ppid=2268 pid=5068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:50.571000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:51.970498 kubelet[2063]: E1213 14:24:51.970447 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:24:53.421245 systemd[1]: Started sshd@23-10.0.0.64:22-10.0.0.1:33026.service. Dec 13 14:24:53.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.64:22-10.0.0.1:33026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.422635 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:24:53.422684 kernel: audit: type=1130 audit(1734099893.420:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.64:22-10.0.0.1:33026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.459000 audit[5077]: USER_ACCT pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.461544 sshd[5077]: Accepted publickey for core from 10.0.0.1 port 33026 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:53.464082 sshd[5077]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:53.462000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.468122 systemd-logind[1198]: New session 24 of user core. Dec 13 14:24:53.468892 systemd[1]: Started session-24.scope. Dec 13 14:24:53.469986 kernel: audit: type=1101 audit(1734099893.459:1509): pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.470052 kernel: audit: type=1103 audit(1734099893.462:1510): pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.470079 kernel: audit: type=1006 audit(1734099893.462:1511): pid=5077 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:24:53.473086 kernel: audit: type=1300 audit(1734099893.462:1511): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd39253840 a2=3 a3=0 items=0 ppid=1 pid=5077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:53.462000 audit[5077]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd39253840 a2=3 a3=0 items=0 ppid=1 pid=5077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:53.462000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:53.478508 kernel: audit: type=1327 audit(1734099893.462:1511): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:53.478561 kernel: audit: type=1105 audit(1734099893.472:1512): pid=5077 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.472000 audit[5077]: USER_START pid=5077 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.482937 kernel: audit: type=1103 audit(1734099893.473:1513): pid=5079 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.473000 audit[5079]: CRED_ACQ pid=5079 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.570575 sshd[5077]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:53.570000 audit[5077]: USER_END pid=5077 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.572826 systemd[1]: sshd@23-10.0.0.64:22-10.0.0.1:33026.service: Deactivated successfully. Dec 13 14:24:53.573578 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:24:53.570000 audit[5077]: CRED_DISP pid=5077 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.576919 systemd-logind[1198]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:24:53.577705 systemd-logind[1198]: Removed session 24. Dec 13 14:24:53.579951 kernel: audit: type=1106 audit(1734099893.570:1514): pid=5077 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.580010 kernel: audit: type=1104 audit(1734099893.570:1515): pid=5077 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:53.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.64:22-10.0.0.1:33026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:58.575521 systemd[1]: Started sshd@24-10.0.0.64:22-10.0.0.1:46452.service. Dec 13 14:24:58.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.64:22-10.0.0.1:46452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:58.576684 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:24:58.576743 kernel: audit: type=1130 audit(1734099898.574:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.64:22-10.0.0.1:46452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:58.611000 audit[5090]: USER_ACCT pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.613408 sshd[5090]: Accepted publickey for core from 10.0.0.1 port 46452 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:24:58.614952 sshd[5090]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:58.613000 audit[5090]: CRED_ACQ pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.618504 systemd-logind[1198]: New session 25 of user core. Dec 13 14:24:58.619537 systemd[1]: Started session-25.scope. Dec 13 14:24:58.621486 kernel: audit: type=1101 audit(1734099898.611:1518): pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.621603 kernel: audit: type=1103 audit(1734099898.613:1519): pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.621646 kernel: audit: type=1006 audit(1734099898.613:1520): pid=5090 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:24:58.613000 audit[5090]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0ea0bf10 a2=3 a3=0 items=0 ppid=1 pid=5090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:58.628522 kernel: audit: type=1300 audit(1734099898.613:1520): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0ea0bf10 a2=3 a3=0 items=0 ppid=1 pid=5090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:58.628561 kernel: audit: type=1327 audit(1734099898.613:1520): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:58.613000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:58.630063 kernel: audit: type=1105 audit(1734099898.623:1521): pid=5090 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.623000 audit[5090]: USER_START pid=5090 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.624000 audit[5092]: CRED_ACQ pid=5092 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.640124 kernel: audit: type=1103 audit(1734099898.624:1522): pid=5092 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.735575 sshd[5090]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:58.735000 audit[5090]: USER_END pid=5090 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.737934 systemd[1]: sshd@24-10.0.0.64:22-10.0.0.1:46452.service: Deactivated successfully. Dec 13 14:24:58.738833 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:24:58.739658 systemd-logind[1198]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:24:58.740385 systemd-logind[1198]: Removed session 25. Dec 13 14:24:58.735000 audit[5090]: CRED_DISP pid=5090 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.746276 kernel: audit: type=1106 audit(1734099898.735:1523): pid=5090 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.746354 kernel: audit: type=1104 audit(1734099898.735:1524): pid=5090 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:24:58.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.64:22-10.0.0.1:46452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:02.322043 update_engine[1203]: I1213 14:25:02.321947 1203 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Dec 13 14:25:02.322043 update_engine[1203]: I1213 14:25:02.322023 1203 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Dec 13 14:25:02.323112 update_engine[1203]: I1213 14:25:02.323084 1203 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Dec 13 14:25:02.323756 update_engine[1203]: I1213 14:25:02.323725 1203 omaha_request_params.cc:62] Current group set to lts Dec 13 14:25:02.325820 update_engine[1203]: I1213 14:25:02.325793 1203 update_attempter.cc:499] Already updated boot flags. Skipping. Dec 13 14:25:02.325820 update_engine[1203]: I1213 14:25:02.325804 1203 update_attempter.cc:643] Scheduling an action processor start. Dec 13 14:25:02.326137 update_engine[1203]: I1213 14:25:02.325992 1203 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 14:25:02.326675 update_engine[1203]: I1213 14:25:02.326655 1203 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Dec 13 14:25:02.326755 update_engine[1203]: I1213 14:25:02.326728 1203 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 14:25:02.326755 update_engine[1203]: I1213 14:25:02.326740 1203 omaha_request_action.cc:271] Request: Dec 13 14:25:02.326755 update_engine[1203]: Dec 13 14:25:02.326755 update_engine[1203]: Dec 13 14:25:02.326755 update_engine[1203]: Dec 13 14:25:02.326755 update_engine[1203]: Dec 13 14:25:02.326755 update_engine[1203]: Dec 13 14:25:02.326755 update_engine[1203]: Dec 13 14:25:02.326755 update_engine[1203]: Dec 13 14:25:02.326755 update_engine[1203]: Dec 13 14:25:02.326755 update_engine[1203]: I1213 14:25:02.326756 1203 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:25:02.329509 update_engine[1203]: I1213 14:25:02.329486 1203 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:25:02.330077 update_engine[1203]: I1213 14:25:02.330047 1203 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:25:02.333549 locksmithd[1240]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Dec 13 14:25:02.405811 update_engine[1203]: E1213 14:25:02.405754 1203 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:25:02.406096 update_engine[1203]: I1213 14:25:02.405856 1203 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Dec 13 14:25:03.738356 systemd[1]: Started sshd@25-10.0.0.64:22-10.0.0.1:46466.service. Dec 13 14:25:03.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.64:22-10.0.0.1:46466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.740490 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:25:03.740545 kernel: audit: type=1130 audit(1734099903.737:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.64:22-10.0.0.1:46466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.777000 audit[5125]: USER_ACCT pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.779645 sshd[5125]: Accepted publickey for core from 10.0.0.1 port 46466 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:25:03.783000 audit[5125]: CRED_ACQ pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.784841 sshd[5125]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:03.789186 kernel: audit: type=1101 audit(1734099903.777:1527): pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.789270 kernel: audit: type=1103 audit(1734099903.783:1528): pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.789311 kernel: audit: type=1006 audit(1734099903.783:1529): pid=5125 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:25:03.789068 systemd-logind[1198]: New session 26 of user core. Dec 13 14:25:03.789983 systemd[1]: Started session-26.scope. Dec 13 14:25:03.783000 audit[5125]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e0b99e0 a2=3 a3=0 items=0 ppid=1 pid=5125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:03.814093 kernel: audit: type=1300 audit(1734099903.783:1529): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e0b99e0 a2=3 a3=0 items=0 ppid=1 pid=5125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:03.814153 kernel: audit: type=1327 audit(1734099903.783:1529): proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:03.783000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:03.793000 audit[5125]: USER_START pid=5125 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.838785 kernel: audit: type=1105 audit(1734099903.793:1530): pid=5125 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.839002 kernel: audit: type=1103 audit(1734099903.794:1531): pid=5127 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.794000 audit[5127]: CRED_ACQ pid=5127 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.915682 sshd[5125]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:03.915000 audit[5125]: USER_END pid=5125 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.917998 systemd[1]: sshd@25-10.0.0.64:22-10.0.0.1:46466.service: Deactivated successfully. Dec 13 14:25:03.918759 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:25:03.919360 systemd-logind[1198]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:25:03.920032 systemd-logind[1198]: Removed session 26. Dec 13 14:25:03.915000 audit[5125]: CRED_DISP pid=5125 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.924475 kernel: audit: type=1106 audit(1734099903.915:1532): pid=5125 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.924561 kernel: audit: type=1104 audit(1734099903.915:1533): pid=5125 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:25:03.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.64:22-10.0.0.1:46466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'